President Spector shares his thoughts as he completes
FALL 2019
The Monitoring Association
his term See page 3
TMA to Issue FirstNet Certificates of Verification First-of-its-kind wireless broadband network provides the alarm industry and public safety with a more reliable and secure system to transmit and receive alarms.
TMA is pleased to announce that it has now started issuing First Responder Network Authority (FirstNet) Certificates of Verification. As we announced in April, The Monitoring Association (TMA) reached an agreement with AT&T/FirstNet to provide qualified alarm companies with a Certificate of Verification that will enable them to apply to use the FirstNet network for alarm transport.
FirstNet is the public safety nationwide wireless broadband network, built and deployed through a first-of-its-kind publicprivate partnership between the First Responder Network Authority (FirstNet) and AT&T. FirstNet is an independent authority within the National Telecommunications and Information Administration (NTIA) of the U.S. Department of Commerce Department. “TMA members and emergency response professionals share a common passion and drive to save lives. We work together with one another every day to leverage the best-of-the-best in technology and processes to reduce the loss of human life. FirstNet is the next step toward achieving our shared goal,” says TMA President Ivan Spector. “We are proud to take a leadership role in the transition of security alarm company communications to the FirstNet network, which is wholly dedicated for the purpose of public safety when needed most,” added Spector. Public-safety related alarms are critical to alerting first responders of emergencies requiring their urgent response. FirstNet Built with AT&T provides the alarm industry and public safety with a more reliable and secure system to transmit and receive alarms.
FirstNet, cont. on page 6
In this issue: Preview topics and speakers for 2019 Fall Ops, Nov. 11-13 page 12
Catch-up on latest business insurance trends page 31
AICC is tracking FCC call-blocking legislation page 27
2 | TMA Dispatch www.tma.us
Fall 2019
TMA Officers President Ivan Spector, Montreal, QC Secretary Steve Walker, Plymouth, MN Treasurer Alan Gilmore IV, Cleveland, OH Vice Presidents Steve Butkovich, Charlotte, NC Morgan Hertel, Corona, CA Don Young, Boca Raton, FL Immediate Past President Pamela J. Petrow, Warrendale, PA
TMA Staff Executive Director Celia T. Besore, MBA, CAE Vice President of Meetings and Conventions John S. McDonald Vice President of Education and Training Julie N. Webber Director of Membership and Programs Illeny Maaza Director of Marketing and Communications Leigh A. McGuire Information Systems Manager Bryan Ginn Member Services Manager Malory Todd
PRESIDENT’S NOTE Dear Fellow TMA Members, Recently, I was very fortunate to attend a small dinner along with former Canadian Prime Minister Stephen Harper, a man I greatly respect and who led Canada for nine years. Why do I mention this? Because, many of the characteristics that he attributed to those individuals who chose public service as a career are very similar to those I observe in many of the dedicated TMA volunteers. These attributes include a desire to contribute to make things better across the whole Industry; a need to work for the greater good; and a drive to elevate what can be accomplished to achieve greater things, collectively. Those of you who tirelessly raise your hands when called upon time and time again…who do not shirk from challenges presented to you…who don’t say “I have no time” or “I can’t right now”…You know well who you are. You are the pillars of TMA, an inspiration to myself and others. I dedicate my last article to you with my deepest thanks, appreciation, and respect. It has been a quick and fascinating two years. TMA has embarked on some great initiatives that I hope will resonate well into the future. Of these, I would highlight our NFPA initiative; furthering and continuing outreach and adoption of ASAP; TMA’s FirstNet certification; a new TMA Online Operator Level 1 course; and, the relocation to a new, better-suited office space. I could not be prouder of the work done by TMA staff to pull all of these accomplishments together—all the while performing the multitude of tasks required of them. I hope that some of you feel inspired to get involved and to leave your mark on TMA and the industry you have chosen. Don’t wait until someone asks you to do something. Volunteer and get involved. We need new blood, new ideas, and new energy. Without your fresh perspectives on things we will not maintain our relevancy and ability to navigate today’s challenging business landscape. It has been an honor and a humbling and consuming experience being President of TMA. Without many of you helping me along the way, I really don’t think I would have made it to this point.
7918 Jones Branch Drive, Suite 510 McLean, VA 22102 703-242-4670; Fax 703-242-4675 www.tma.us Our mission is to promote and advance premier professional monitoring to our consumers and first responders through education, advocacy, and the creation of standards. Copyright ©2019 The Monitoring Association.
I thank each and every one of you. I extend special thanks to an outstanding Executive Committee and an engaged and committed Board of Directors and to my team at Sentinel, who could not have been happier to have me otherwise occupied. I am most grateful to my family for putting up with me. I am proud to leave my position in the very capable hands of our incoming President Don Young – may he enjoy the position as much as I have. I hope to see you at the many outstanding education, networking, and bestpractice events that TMA offers throughout the year. Humbly and with thanks,
All rights reserved.
Ivan Spector Fall 2019
www.tma.us TMA Dispatch | 3
EXECUTIVE DIRECTOR’S REPORT
When 1+1 Equals More Than Two By Celia T. Besore, MBA, CAE cbesore@tma.us Think for a moment…can you remember an initiative involving the collaboration of two companies that resulted in a whole new product? Heightened value? Improved efficiency? The potential benefits of such an alliance are endless. A quick Google search revealed a couple such successful collaborations…Taco Bell and Doritos and Starbucks and Spotify. Within our own industry, we’ve seen and experienced the results of organizations and businesses coming together in pursuit of a common goal. By jointly investing their resources, great things happen for many. In preparation for this column, I jotted some notes of how TMA has collaborated with others. Many came to mind. One of the newest and most exciting joint initiatives is First Net, a dedicated public-safety nationwide wireless broadband network, built and deployed through a first-of-its-kind public-private partnership between the First Responder Network Authority (FirstNet Authority) and AT&T. Qualified alarm companies may now apply to use FirstNet services through TMA. TMA has also worked closely with law enforcement and fire agencies and the organizations that represent their interests. Our ASAP-to-PSAP program is another great success story that demonstrates the power of collaboration. Nlets and APCO are just two of the organizations that have come together to develop and support the deployment of this life-saving service. We have collaborated with the NSA to support their reclassification of telecommunicators from clerical
to protective. We continue to strengthen our relationships with the IACP and IAFC and other first responder organizations. Education has also been a natural area for partnership. Our single largest collaboration in this area is the annual ESX event. Together, ESA and TMA, host a combined education and networking event for alarm dealers, monitoring companies, and industry manufacturers/service providers. Be sure to look for our 2020 event announcements – I think you’ll be pleasantly surprised by some new twists. Looking ahead, TMA is working with UL on a series of educational webinars focused on the new UL 827 standard changes that will impact your company. These are planned for the first quarter of 2020. On the philanthropic side of our industry, I know many of our members partner with local or national non-profit organizations to improve the lives of others in need. We love to hear and share these stories! I had the opportunity to work with a non-profit in our industry, Mission 500 (www.mission500.org) earlier this year. Mission 500 is a shining example of what one organization and a host of security companies can accomplish when they contribute their time, expertise, heart, and money into one giant “pot”. When you look to grow your company, please remember to reach out to TMA. We want to partner with you to achieve your greatest success. Your goals are our goals. We look forward to hearing from you.
Fall 2019 Advertising Index The Monitoring Association extends their appreciation to the following advertisers for their generous support: Altronix, page 38 www.altronix.com
DMP, page 13 and belly band www.dmp.com
Axis, page 9 www.axis.com
IPtelX, page 11 www.iptelx.net
Bold Technologies, pages 2 and 25 www.boldgroup.com
NAPCO, page 44 (Back Cover) www.napcosecurity.com
Central Insurance Agency, page 17 www.ciainsures.com
Resideo, page 33 www.resideo.com
DICE Corporation, page 43 www.dicecorp.com
Tyco, page 5 www.tycosecurityproducts.com
The TMA Dispatch is published quarterly by The Monitoring Association (TMA). Send address changes to TMA, 7918 Jones Branch Drive, Suite 500, McLean, VA 22102 or to membership@www.tma.us. Subscription policy: Individual subscriptions are available without charge to TMA members. Back issues of the Dispatch are obtainable for $10, if available. TMA does not provide legal advice, business advice or any other kind of advice that should be relied upon in making business decisions, and does not assume and hereby disclaims any liability to any person or company for any loss or damage caused by errors or omissions in the material contained herein, regardless of whether such errors result from negligence, accident, or any other cause whatsoever. Printed in the USA.
4 | TMA Dispatch www.tma.us
Fall 2019
To see or not to see? That is the question. With AXIS Guardian, your customers can have peace of mind knowing their surveillance system is able to quickly see and verify threats as they arise. AXIS Guardian is an entirely cloud-based, managed service platform tailored specifically to the needs of Alarm monitoring providers providing a two-in-one security offering – as a fully integrated alarm and surveillance service. Combining AXIS Guardian, Axis network cameras and monitoring allows for fast video verification and quick response if needed. Installation is simple with a one-click camera connection and the platform also allows for easy integration with alarm systems, audio, access control and video analytics, for more enhanced capabilities. Best of all, it’s completely hosted and managed by Axis – allowing us to help keep things secure and reliable and keeping things hassle-free maintenance for you.
See more at www.axis-communications.com/tma-axisguardian
FirstNet, cont. from page 1
FirstNet eligibility is limited to those companies who meet accepted alarm industry standards that result in the transmission of public safety related alarms from systems designed primarily to protect life and/or property (e.g. robbery, burglary, unlawful intrusion, fire, emergency medical) to a Central Station Monitoring Facility that confirms and verifies the authenticity of the alarm and notifies a Public Safety Answering Point (PSAP) for relay to a public safety agency for the purpose of initiating an emergency response. As we mentioned above, for an alarm services company to qualify to use the FirstNet network for alarm transport, it must first verify compliance through receipt of a Certificate of Verification from TMA. The alarm services company can then seek approval for eligibility to operate on the FirstNet network by presenting the TMA Certificate of Verification to AT&T/FirstNet along with their contract(s) and/or service
“
We work together with one another every day to leverage the best-of-the-best in technology and processes to reduce the loss of human life. FirstNet is the next step toward achieving our shared goal,” says TMA President Ivan Spector.
order(s), or to another alarm services company who will be providing FirstNet services from AT&T. The TMA Certificate of Verification must be renewed every 12 months from when the initial TMA Certificate is issued. “FirstNet will enhance the reliability of our alarm connections. I am very pleased the alarm industry will be able to use FirstNet for alarm transport,” said Louis T. Fiore, chairman of AICC and past president of TMA. TMA would like to thank Chief Harlin R. McEwen, Honorary President of the International Association of Chiefs of Police and Louis T. Fiore, chairman of AICC and past president of TMA for their many years of efforts to get the electronic security industry included in FirstNet. For more information, please contact TMA Executive Director Celia Besore at 703-242-4913 or at cbesore@tma.us.
Sur-Gard
Sur-Gard System 5 with visual verification support. A powerful, yet more compact virtual receiver. REDUCED FALSE ALARMS
Building on the Sur-Gard legacy, SG-System 5 supports alarm verification solutions to significantly reduce costs associated with false alarms. The more compact footprint facilitates space management while offering the highest account density per U rack available in the industry. Built-in redundancy for power and auto-switching assures continuous performance of all peripheral devices connected to the output ports.
Industry-leading reliability and unbeatable capacity, all in a compact receiver. For more information on products featured here call 1-800-418-7618 or visit www.sur-gard.com
6 | TMA Dispatch www.tma.us
Fall 2019
Cellular Upgrade Program A Year of Free Cellular Service From SecureCom Wireless™ Receive a full free year of communication and ALL the app services you want including Video Doorbell, Z-Wave and Video Verification when upgrading other existing manufacturers’ systems using LTE DualComs and CellComs. For more information go to DMP.com/3GSunset.
We make your company more valuable. 877-725-1114 • DMP.com
Keep updated on our new products and features: @DMPAlarms
Fall 2019
Offer good August 1 - December 31, 2019.
www.tma.us TMA Dispatch | 7
AICC REPORT
FirstNet; A Historical Overview By Louis T. Fiore, Chair, AICC
Public Safety has struggled with the subject of “interoperability” for many years. While many of the separate departments operate independently, there are many incidences where cross communications is required. Such as example was the tragedy of 9-11. To that end, a short history is in order. 1995–2012 - Public Safety started its efforts in 1995 to obtain more voice and data spectrum. Efforts to improve public safety communications continued for many years and were bolstered by the tragic events of 9/11 (2001) and the public safety communications failures during those attacks. One recommendation of the 911 Commission was to ask Congress to pass “...legislation which provides for the expedited and increased assignment of radio spectrum for public safety purposes.” February 22, 2012 – The President signed the Middle Class Tax Relief & Job Creation Act of 2012 that included the creation of the First Responder Network Authority (FirstNet). This is known as Public Law 112-96 or the Middle Class Tax Relief and Job Creation Act of 2012 (Public Law 112-96), which was signed into law by President Obama on February 22, 2012. It created the First Responder Network Authority (FirstNet) as an independent authority within the National Telecommunications and Information Administration (NTIA) at the U.S Department of Commerce. The Act directs FirstNet to establish a single nationwide, interoperable public safety broadband network. The FirstNet Board is responsible for making strategic decisions regarding FirstNet’s operations. 2012-2017 - The FirstNet Board was appointed (Oct. 22, 2012) and commenced hiring staff and began its efforts to plan for implementation of the Nationwide Public Safety
8 | TMA Dispatch www.tma.us
Broadband Network (NPSBN). March 30, 2017 - FirstNet announced it had chosen AT&T as its partner to build out the NPSBN. During 2014, AICC worked with the International Association of Chiefs of Police (IACP), International Association of Fire Chiefs (IAFC) and the National Sheriffs’ Association (NSA) for the passage of resolutions on behalf of the partnership of these associations and the Alarm Industry. Language contained in the resolutions is below. It spells out the mutual cooperation between Public Safety and the listed Alarm Industry. “There are benefits for the Alarm Industry and public safety if FirstNet authorizes the Alarm Industry to be a user of the FirstNet Nationwide Public Safety Broadband Network (NPSBN) and, “A fully integrated public safety data network will prioritize public safety communications and also facilitate use by networks which support the public safety mission. The alarm industry is an important part of the emergency services delivery model and alerting, monitoring, imaging and related activities aid first responders. Providing access to the FirstNet network for such important public safety partners benefits public safety, the community, and provides ubiquitous solutions for the alarm industry which benefits public safety in general.” “The use of the NPSBN by the Alarm Industry would be for
premises alarm units at government facilities, businesses, and homes, to communicate alarm information through the NPSBN to participating central station alarm facilities. Typical signals would be burglar alarm, fire alarm, medical alarm signals, and other related signals. The verified alarm information would then be transmitted from the central station alarm facility to the Public Safety Answering point (PSAP) using the Automated Secure Alarm Protocol (ASAP) or if ASAP is not available, through the NPSBN.” Alarm Industry Benefits Ever-evolving communications technology creates alarm industry hardship due to on-going hardware conversion requirements. With the use of FirstNet, the industry has a stable platform for a much longer time. Advancing technology of commercial networks in reliability and redundancy do not align with alarm industry needs and standards. FirstNet offers an up to date, reliable and hardened network yielding enhanced peace of mind for the industry and customers by integrating the alarm industry with FirstNet/AT&T Alarm Industry Eligibility Eligibility is overseen by TMA, who will issue a certificate to alarm central station companies. The alarm central station company would have to prove its eligibility as a listed company (listed by a Nationally Recognized Testing Laboratory such as UL, ETL or FM) and its knowledge of the rules.
AICC Report, cont. on page 11 Fall 2019
“One-Go, All-Go”
SiXCOMBO Two-Way Smoke/and CO Detector It’s the industry’s first two-way, professionally monitored, wireless, combination smoke/heat and carbon monoxide (CO) detector – and the life safety detection every home deserves. With its four sensing elements, smoke and CO detection is improved and false alarms are reduced. All SiX™ life safety devices, including a wireless siren feature “One-Go-All-Go” - when one detector sounds, they all sound. Alerts are crystal clear with
© 2019 Resideo Technologies, Inc. The Honeywell Home trademark is used under license from Honeywell International Inc. All rights reserved.
multi-lingual voice annunciation and a 360° visual alarm that spans the unit. The SiXCOMBO – it’s the perfect way to lead with life safety and differentiate your business with every Lyric® installation. For more information, please visit hwsproducts.com/sixcombo/tma or call 1-800-645-7492.
SIAC: Industry Continues to Win Support By Stan Martin, Executive Director, Security Industry Alarm Coalition
A recent article in Security Sales and Integration Magazine reports that Tennessee Governor Bill Lee has signed a bill prohibiting local governments from requiring alarm companies to collect or pay alarm permit fees and bars cities from issuing fines to dealers for false alarms suffered by end-users. Unfortunately, at the same time, the city of Sandy Springs, Georgia was implementing a new ordinance requiring verification prior to police dispatch. The city had already passed an ordinance mandating alarm companies be fined for false alarms. The problem in Sandy Springs is that the city council bought into a series of misstatements commonly utilized by industry opponents to attack the alarm industry and those
it protects. These include that the model ordinance doesn’t work, that only a minority of citizens have alarm systems, and that alarm companies are making money utilizing public resources. Thanks to SIAC’s work with law enforcement, the vast majority of public safety leaders know these claims are inaccurate and, as they did in Tennessee, work with the industry on solutions to reduce false alarms while maintaining police response. In Tennessee, lawmakers recognized the important role that the electronic security industry plays in protecting schools, businesses, homes and infrastructure, as well as lives. The state recognized that, while there should be accountability for those who create false alarms,
the strong partnership between law enforcement and the electronic security industry promoted by SIAC and state alarm associations is vital to public safety. Sandy Springs is an aberration. It is a small city that did not listen to citizens who vehemently objected to verified response with detailed and well-reasoned arguments. The city would rather spend hundreds of thousands of dollars in legal fees than work to properly implement the proven model ordinance. SIAC is working hard to make sure there are more cases like Tennessee and fewer outliers like Sandy Springs and along with state and local alarm associations needs continued support for these successful efforts.
AlarmBiller® Pro delivers secure, web-based alarm billing software to maximize efficiency in your business. Stop relying on spreadsheets, multiple software programs, and manual paperwork...it’s time to break free. Create recurring invoices
Branded customer web portal
Track appointments
Manage employee time & attendance
Schedule work orders
Track goods with Inventory Management
Write proposals
Nurture leads with Sales Automation
REQUEST A DEMO: BOLDGROUP.COM • 800-255-BOLD 10 | TMA Dispatch www.tma.us
Fall 2019
Central Insurance Agency, Inc (CIA) is a specialized agency for the security and alarm industry. CIA contracts with several insurers to provide customers with competitive prices, broad coverage and wide line of products. The agency strives to provide each customer with responsive expertise. We provide insurance to companies that offer Burglar, Fire, CCTV, Access Control, Home Automation, PERS/Medical Alarms, Armed & Unarmed Guard/Patrol Response, Fire Suppression and Armored Car Services.
Please contact Alice Cornett Giacalone for a complimentary review of your current program and quotes.
As an insurance professional focused on the security and alarm monitoring industry for twenty five years, Alice Cornett Giacalone is known throughout the United States as the premier specialist to this industry. Her client list includes the “who’s who” of the security, medical monitoring and low voltage contracting industry.
Coverage options include: • • • • • • •
General Liability/Errors & Omissions Employment Practices Liability Fiduciary Liability Cyber Liability Directors & Officers Liability Auto Liability & Physical Damage Risk Management
• • • • • • •
Umbrella/Excess Liability Property/Inland Marine Workers’ Compensation Surety Bonds Crime Employee Benefits Liability Consultation
Central Insurance Agency, Inc. (Davenport Office) 2942 N Harrison Street, Davenport, IA 52803 Phone: 800-917-ALICE (2542) / E-Fax: 908-842-0313 / Email: aliceg@ciainsures.com
AICC Report, cont. from page 8
Priority Recognizing the need of citizens to maintain continual police, fire and medical alarm protection, in the event of a local or regional emergency, when the administrator of the NPSBN declares it necessary, the alarm central station users would have their bandwidth usage limited to basic, low bandwidth application use such as normal burglar alarm, fire alarm and medical emergency signaling, shedding high bandwidth signaling such as streaming video. Such limits would be done on a local, city, or regional basis as required. This could potentially be done automatically through installed equipment that automatically limits bandwidth through system commands. (If such equipment were to become available, use of this equipment would become part of the eligibility requirements.) Requests for Additional Bandwidth When requested by the administrator of the NPSBN, either at an incident or over a greater area, Fall 2019
additional bandwidth to certain applications could be used to aid Public Safety. An example of this might be turning on streaming video to be able to look inside a particular alarmed building. This could potentially be done automatically through installed equipment that automatically controls bandwidth to applications through system commands.
Never too early to plan... Mark your calendar now for TMA’s 2020 Annual Meeting!
Where We Are TMA now has in place a simple procedure for the vetting of alarm companies wishing to be involved with this program. Please contact TMA for additional information. This allow TMA to verify the continual status of an alarm installing and monitoring company’s listings. The use of FirstNet brings a new era in the reliability of alarm monitoring and marks our continued cooperation with Public Safety.
www.tma.us TMA Dispatch | 11
#TMAFallOps19
Fine Tuning for Excellence TMAÊs 2019 Fall Operations Seminar, Nov. 11-13, Minneapolis, MN The 2019 TMA Fall Operations Management Seminar is one of three TMA’s annual educational meetings offered during the year. This key meeting is specifically geared to functional and operational managers from member companies who gather for industry intelligence gathering, networking and operational monitoring education. A monitoring center tour is a highlight of the experience, and this year, Stanley Convergent Security Solutions will offer attendees an exclusive tour of their ProtectionNet™ Customer Services Center. The size of the group allows for a diverse exchange, and keeps 12 | TMA Dispatch www.tma.us
conversations very interactive. Access to the speakers and panelists is as easy as raising your hands. The 2019 theme is Fine Tuning for Excellence. Come fill up your think tank and spark new ideas! Educational programming focuses on best practices in monitoring centers, including updates on the latest industry standards, staff management strategies, the latest news in software and equipment, and other operational best practices, processes and procedures. The program reflects content proposed by a recent attendee survey to stay focused on trending topics. The topics for our session offerings are all relevant and just-in-time solutions-based sessions that will provide actionable take-aways to all who attend.
Fall Ops opens with a State of the Industry report with important industry trends that may impact future operational decisions. Our first session is in response to all-too-familiar news headlines about workplace violence. Kirk MacDowell, President of MacGuard Security and Anita Ostrowski, Vice President of Central Station Services at Vector Security, Inc. will provide realworld advice based on past and current experiences with what happens when your place of work becomes a crime scene. The session will walk attendees through the critical steps of planning and preparing for an incident that will bring your business to a halt. Kirk and Anita will cover how to help your employees respond, communicate, and mitigate through a crisis to increase your chances of survival and ensure business continuity during a stop-work situation. Fall 2019
Key staff from Stanley Convergent Security Solutions will present a process overview of their recent transition to a new automation system and will lead a discussion on issues associated with proactive vs. reactive technology upgrades. For those interested in the latest application of video and audio monitoring services, industry leaders will present a detailed overview and best-practices guide to better understand how these technologies are going to help monitoring centers in the future. Included in the discussion will be what changes to expect that will alleviate operator intervention and optimize workload. Moderating the session, John Romanowich, President & CEO SightLogix, will facilitate a conversation between industry leaders, such as Brandon Niles, Director of Operations, Acadian Monitoring, and a representative from SureView, who are actively implementing and benefiting from these technologies. Three other sessions will focus specifically on professional development for operations managers who are looking for new and innovative ideas to address common management challenges. Because effective training in the life-safety industry is critical for new operators, keeping your employees engaged and productive is everyone’s challenge. One session will focus
The 2019 Fall Ops Tour offers attendees an insider view...
STANLEY Security monitors all types of security systems for everyone from homeowners to Fortune 500 companies from one of five monitoring centers in the U.S. and Canada.
Fall 2019
on new hire orientation strategies. Attendees will hear tips and creative solutions to address employee burnout, non-monetary incentives and non-traditional schedules. From industry research, TMA heard that developing trust and accountability in the monitoring center were significant challenges. Sessions on Fine-Tuning Communication for Accountability and Servant Leadership are in place to help guide supervisors and managers. Regular communication lets the team know when they are meeting or not meeting their goals. Hear real-world advice on how to reignite sense of urgency and staff commitment on your team. How you communicate must include examples of what success looks like in your company culture. Join Steve Crist, Director of Monitoring, ADS Security and Nic Barrus, Operations Manager, AvantGuard Monitoring as they explore what types of feedback inspires accountability and pride in performance through conflict resolution strategies and relevant industry benchmarks. Being a servant leader means that you put your team first, and yourself second. Morgan Hertel, VP of Technology and Innovation, Rapid Response Monitoring Service, will lead a panel of practitioners about real-world implementation strategies to help you transform and recalibrate into the servant leader role. It has been proven that because servant leaders regularly engage with their teams, they build stronger working relationships leading to less staff turnover. “Last year, through an engagement exercise, we totaled the number of years of experience that we had in the room,” says Julie Webber, TMA’s VP of Education and Training, “and the number was an astounding 1,098! You rarely get that level of access to industry experts who are willing to share their knowledge and expertise.” Program, registration, and housing information is posted at https://tma. us/fall-ops/
Roundtable Exchange A highlight of the event is a two-hour Roundtable Exchange session that allows all participants to “Come with a problem, leave with a solution!” Subject matter experts will lead discussions on the topics listed below. 3G, etc. Telecomm Updates (Example: customers will soon have the ability to block call that are not in their phone directories) Industry Software Update Software automation is changing the face of industry. What’s coming down the road… Business Continuity Best Practices Follow up on emergency response plan discussion Time Management for Operators Tips for keeping operators busy without causing burnout Best Practices for Operator Care How to take care of our employees and keep them healthy (mentally, physically and financially); holistic care of monitoring center staff (example, more operators are receiving customer suicide calls) Monitoring Center Training Best Practices New Hire Orientation, professional development, and soft skills The Multigenerational Workforce How to hire, understand, and effectively manage your team Customer Service Benchmarks What metrics should we be collecting and evaluating for quality assurance Wildcard Slot We will have a wild card topic where people can talk freely about specific challenges not covered above
www.tma.us TMA Dispatch | 13
and talking to people — having these kinds of blue-sky conversations to think of things in a different context. We focused on being a value center and building a safer world.” Existing group? Or, start from scratch? Eventually, those conversations led the group to Francesca Rossi, IBM’s global leader for AI ethics. After speaking with Rossi, who also sits on the board of directors for PAI, the ELP members expanded their group to include colleagues from UL’s Research, Standards and Education team. Ultimately, PAI stood out for its focus on developing and sharing best practices, advancing public understanding and providing a platform for discussion and engagement — principles that aligned with not only the goals of UL, but UL’s not-for-profit as well. Since joining PAI, Director of Data Science David Wroth has led the effort to facilitate engagement between the two organizations. “I give Dave huge kudos that he’s latched onto this with such vigor,” Carpenter said. “I am really starting to see us contribute. PAI is now starting to use the same developmental system that we use to create our Standards. I believe we’ve achieved the initial mission that Christian asked of us.” Work, Work, Work Currently, UL is using its knowledge of safety to take part in the Safety-Critical AI Working Group, where UL has been working on projects such as Standards development, an AI Incident Database and an AI Safety Primer. UL’s Standards Program Manager, Deb Prince, is collaborating broadly across all the working groups to anticipate best practices and to figure out how UL’s Standards may be able to reflect the findings of PAI. Is there a cobot in your future? “One common area of interest is to ensure that AI systems are implemented into workplaces safely,” Wroth said. “In the case of a collaborative robot (cobot), we want to find out if the robot is safe to use in areas where they manage work that is then executed by people. We look to make sure AI applications don’t create new physical or new psycho-social hazards.” Wroth explained that the plan is to widen UL’s reach by Submitted by UL having its experts cooperate with PAI. Mary Burton, user As part of UL’s work to help shape the future of experience director of Emergo by UL, was nominated to artificial intelligence (AI) into one that can be trusted, assist with the Humans and AI working group, while Data UL recently joined the Partnership on AI (PAI) in order Science Research Manager Andrew Kapp was appointed to to make sure AI benefits people and society. support the group AI, Labor and the Economy. In this edition of the TMA Dispatch, we share some You can learn more about PAI by visiting its website, insights on why and how. In 2018, Senior VP and Chief partnershiponai.org. Also, follow @UL_Datascience Digital Officer Christian Anschuetz asked members of on Twitter to interact with us and get the latest news on UL’s UL’s executive leadership program (ELP) to look at the data science work. role of machine learning in artificial intelligence. His big ask? To discover where these technologies are going and how to use them for growth. “We started by thinking about digital disruption and how we have the entire world in front of us,” Originally published at: https://www.ul.com/news/advancing-futuresaid UL’s Vice President of Finance and 2018 ELP safety-and-artificial-intelligence member, Darrell Carpenter. “We just started calling
Advancing the Future of Safety and Artificial Intelligence
14 | TMA Dispatch www.tma.us
Fall 2019
ALTRONIX
PACKS A 1-2 PUNCH!
TROVE STREAMLINES ACCESS CONTROL DESIGN AND DEPLOYMENT, INCREASING PROFITS AND ROI. WINNING POWER COMBINATIONS – ENHANCING YOUR CUSTOMER’S SECURTY.
Pre-assembled kits now available! MADE IN THE U.S.A.
Fall 2019
www.tma.us TMA Dispatch | 15 CUSTOMIZE TROVE AT ALTRONIX.COM
ASAP UPDATE
TMA’s ASAP-to-PSAP Continues to Grow 60 ASAP Active PSAP’s
ASAP Saves Time, Improves Accuracy, and Increases Efficiency between PSAPs and Monitoring Centers Learn more on TMA’s website.
Montgomery, AL Morgan County, AL Little Rock, AR Chandler, AZ Tempe, AZ Phoenix, AZ Washington, DC Boca Raton, FL Bradenton, FL Charlotte County, FL Collier County, FL Manatee County, FL Riviera Beach, FL Sarasota County, FL Prince George’s County, MD Durham, NC Guilford County, NC Johnston County, NC Alpharetta, GA Augusta/Richmond County, GA
Boone County, MO Cary, Apex, and Morrisville, NC High Point, NC Union County, NC Wilson County, NC Kernersville, NC Fayetteville/Cumberland County, NC Monroe County, NY Broome County, NY Delaware County, OH Dublin, OH Hamilton County, OH Bucks County, PA Dauphin County, PA Monroeville, PA Chester County, PA Bradley County, TN Brentwood, TN Hamilton County, TN Williamson County, TN
Burleson, TX Highland Park, TX Houston , TX Denton County, TX Grand Prairie, TX Missouri City, TX Plano,TX Williamson County, TX Chesapeake, VA York County, VA James City County, VA City of Richmond, VA Henrico County, VA Hanover County, VA Loudoun County, VA Newport News, VA Powhatan County, VA Roanoke, VA Virginia Beach, VA Dane County, WI
PSAP’s in Testing or Implementation Birmingham, AL Paradise Valley, AZ Lee County, FL West Palm Beach, FL DeKalb County, GA Aurora, IL Indianapolis, IN Frederick County, MD Brunswick County, NC
Raleigh-Wake County, NC Suffolk County, NY Chagrin Valley-Bedford, OH Cincinnati, OH Mansfield, OH Westerville, OH Orleans Parish, LA Elk County, PA
Memphis, TN Nashville, TN Beaumont, TX Galveston, TX Harris County, TX Arlington County, VA Bremerton, WA Tacoma-Pierce, WA
Minimize Your Cyber Risk - Webinar Series TMA is pleased to announce a four-part Cybersecurity webinar series, taught by Ryan Fritts, Vice President of Product and Information Security, Chief Information Security Officer (CISO) for ADT. The course is designed for Monitoring Center IT staff interested in the latest developments in threat management. Participants will learn how to mitigate external attacks and insider threats. Visit TMA.us for more detailed information.
About the instructor:
Thursday, Nov 7 - Webinar #1: Cybersecurity Baselines (Compliance, baseline security requirements) Thursday, Nov 21 - Webinar #2: Vulnerabilities & Risk Management Monday, Dec 2 - Webinar #3: Social Engineering (The Human Threat Element) Monday, Dec 9 - Webinar #4: Data Breaches (Forensic and legal perspectives around cyber and crisis communication)
(CISO) for ADT, a $4.5B+ leader in
Registration Fees:
security, privacy assurance and
At registration, there will be a short knowledge quiz to help the instructor determine level of instruction on each topic.
TMA Members: $279 (4 sessions, exam, certificate); $79 each (a la carte) Non-members: $399 (4 sessions, exam, certificate); $110 each (a la carte)
Save money by signing up for the series or select the topics that interest you. All webinars are from 3:00 – 4:30 pm EST on the dates below. The first hour will be instruction with a 30 minute Q&A to follow each session. To qualify for a certificate, attendees must attend all sessions and successfully pass an exam.
16 | TMA Dispatch www.tma.us
Ryan Fritts is the Vice President of Product and Information Security, Chief Information Security Officer
physical security and electronic security monitoring. Ryan manages ADT’s global organizational policies, standards and controls in his realm of information
compliance. Ryan offers a strong, proven track record of improving operational security posture and has spent his career focusing on security, product, technology, and software delivery. Fall 2019
TMA MEMBER NEWS
The Monitoring Association (TMA) is pleased to share news from and about TMA members. Please send your news and announcements to communications@tma.us.
In recognition of CyberSecurity month (October), keep an eye out for the following special offerings from TMA members:
Open Eye will share tips, best practices, and articles on how to better protect your video security investment on LinkedIn throughout the month. Bold Group will share videos that demonstrate how easily criminals can exploit IoT vulnerabilities to corrupt a network or steal data, and insightful blog posts that clearly explain common threats and simple solutions. Product News 2N, an Axis company, offers a wide portfolio of access control systems, including audiovisual IP intercoms, IP answering units and IP access control units. 2N’s products are well-suited to many settings, such as education, commercial, residential, retail or healthcare. The company released three new products: 2N LTE Verso, the world’s first cellular intercom; 2N Indoor Touch 2.0 answering unit; and, 2N Indoor Compact answering unit. Brivo will launch three new features this fall.
New Brivo Mobile Pass design: Accessing doors from your smartphone is easier than ever
See more with Brivo Onair Cam: Have a simple, two-click process to play clips of important access events and easily view live feeds to protect your facility
Increase efficiency with Brivo Visitor: Automate the sign-in experience for guests, simplify the process of notifying hosts when guests arrive and easily generate reports
Micro Key Solutions has released an enhanced version of their backup and continuity service offering product, Micro Vault. Micro Vault provides Micro Key customers a complete daily cloud backup and disaster recovery strategy that also includes a proprietary validation of the data. DMP’s Entré 8.4 software has added multiple performance enhancements - including single sign-on for user convenience and overall greater security. The System Overview dashboard on DMP’s Virtual Keypad Access gives customers a way to manage their system quickly and easily. At the top, they’re accustomed to seeing Arming and History followed below by other sections. Version 2.17 gives customers the ability to reorder those sections, based on what they use the most.
Fall 2019
DMP has expanded its line of high-security access control products with the addition of the 1301M MIFARE DESFire Admin Reader. This enrollment reader is designed exclusively for DMP and is 100 percent compatible with our MIFARE DESFire cards and credentials, including DMP CSK-2 and DE2 credentials. DMP customers now have a new faster and easier way to import multiple customer user codes into Dealer Admin or Virtual Keypad Access. Plus, with Dealer Admin 2.29 and Tech APP 2.4, customers now also have the flexibility to create custom roles and assign permissions for Dealer Admin among your employee personnel on a granular level. Unforeseen repairs from broken water pipes can cause havoc to a homeowner’s budget. Customers can avoid those costly repairs with DMP’s Z-Wave water shut-off device, now supported by Z-Wave appliance support. Open Eye released a four-display remote workstation – its most advanced yet. The OE-RWS4M-CS increases in throughput and channel density mean you can stream up to 162 individual video streams on four 4K monitors. Career News Supreme Security Systems has named David Bitton its president. Prior to this position, David served as the company’s Vice President and COO for 16 years and is taking over the role from his father, Robert Bitton. As President, David B. Bitton will be responsible forthe management and direction of the company’s corporate corporate strategy including business development, acquisitions and expansions into new geographies and vertical markets. This appointment marks the third-generation of leadership in the familyowned business. Founder of Micro Key Solutions, Wayne Torrens returns to lead the technical direction of the company. Torrens will lead the technological direction of the company after taking a leave of absence to undergo an experimental Multiple Sclerosis treatment with Northwestern University in Chicago, IL. Mitch Reitman has been named TBFAA Person of the Year for his involvement with a multitude of industry organizations.
www.tma.us TMA Dispatch | 17
Per Mar Security Services promoted Colin Vick, CPP, to Regional Vice President, Security Officer Division. In this role, Vick will be in charge of all security officer operations and branches in Minnesota and Wisconsin. Vick started with Per Mar 17 years ago as a Security Officer, and has held various positions throughout the Security Officer Division. In 2011, Vick became board-certified in Security Management by earning his Certified Protection Professional (CPP) through ASIS International.
In Memoriam
Edward Zachar has been named Dealer Development Manager for DMP’s Los Angeles Region. In his new role, Edward will be responsible for developing new sales and providing ongoing service to the area’s DMP-authorized dealers, helping them grow their businesses. Previously, he worked the last 10 years with Johnson Controls Security Solutions as Regional Government Account Manager.
Ronald “Brad” Glore
COPS Monitoring has promoted Eric Scrivana to the newly created position of Operations Project Manager. In his new position based at COPS’ NJ National Headquarters, Scrivana will focus on maintaining high quality and consistency of services at each of the six locations in COPS’ network of six ULlisted monitoring stations. AICC Chairman Louis T. Fiore was elevated to Fellow in the Radio Club of America. He was nominated in recognition of contributions to the art and science of radio communications and broadcast. Shane Clary, vice president of Codes and Standards Compliance for Bay Alarm Co., recently authored an article for Security Sales & Integration magazine. The article, “California Law Protects Alarm Companies From User Permit Fines, Fees”, reviews in detail the details of AB 1289, which was signed into law by California Governor Gavin Newsom.
February 7, 1970-August 19, 2019 Our sincere sympathies to United Monitoring Services, Inc. on the passing of beloved colleague Brad Glore. Leading up to his August 19th death, Brad had courageously fought Cancer. He is survived by his wife and three children, as well as extended family members.
Do you have funds left in your training budget for 2019? Take advantage of end-of-year savings on TMA’s Monitoring Center Operator Online training courses.
Company News Midwest Alarm Services received this year’s NOTIFIER Multi-Million Dollar Award. This is Midwest Alarm Services’ 9th consecutive year winning this significant award. The award is given to the top, most successful fire alarm companies in the industry.
18 | TMA Dispatch www.tma.us
Individual modules of Level 1 are now available. Fees will increase by 5% in 2020!
Buy and save now. www.tma.us/education/ Fall 2019
TMA
Consultant
NEW MEMBERS
Security Funding Associates Tujunga, CA (626) 795-9199 www.securityfundingsolutions.com Contact: Tony Smith
Please join TMA in welcoming our most recent new members: Regular Member Associate Members Davantis Technologies Manassas, VA (703) 973-7527 www.davantis.com Contact: Charles Volschenk Davantis Technologies is a developer of video detection analytics, with specific solutions for central monitoring providers. Maxwell Signs & Decals Chatsworth, CA (818) 773-5533 www.maxwellmfg.com Contact: Michael Kagen Maxwell is a full service manufacturer of high quality custom printed security signs, decals and graphics. Since 1977, they have helped thousands of companies worldwide to promote their professional image and build their brand. With a proud history of developing innovative products and services, their mission is to help facilitate the growth and success of customers and exceed their expectations on every job. RSPNDR Inc. Toronto, ON (866) 477-7637 www.rspndr.io Contact: Frank Pietrobono RSPNDR is an Alarm Response Marketplace that connects Monitoring Stations to a pool of mobile guard companies. The RSPNDR marketplace and platform technology locates the optimum responder on every security alarm dispatch, generating industryleading response times, transparency and electronic reporting.
Fall 2019
Security Funding Associates is a boutique investment banking firm that provides advisory services, financial and operating solutions, and specialized client-defined assignments. Originally founded by Tony Smith, SFA incorporates over twenty years of management expertise and financial deal making in the security alarm industry. International Member JD Security Wetherill Park, NSW, Australia 1 (300) 556-334 www.jdsecurity.com.au Contact: Paul Crawford
Non-Listed Alarm Monitoring Compass Security Solutions Conyers, GA (770) 388-3625 www.compasssecuritysolutions.com Contact: Thomas Frey As the first guard company in the southeast to GPS track their security officers, Compass Security Solutions has strived to provide the best trained and supervised guard since the company started 25 years ago. They later began providing security alarm installation and monitoring, as well as video monitoring services, and soon evolved into a full service security integrator. Guardian Security Systems, Inc. Anchorage, AK (907) 646-8445 www.gssiak.com Contact: Danielle Bowman
Founded in Sydney in 1984, JD Security owns & operates a Grade A1 Alarm Monitoring Centre – Australian Standards’ Best Rating – built with redundant IT systems & other firstclass features. As a leading integrator of security, video & access control systems, JD Security serves Small & Medium Business, Enterprise Business, Government & National Accounts across Australia.
As a family owned and operated company since 1974, Guardian is proud to be Alaska’s only full service security company. They develop security programs for major corpora ons and ins tu ons as well as residen al customers. Services include uniform guards, patrol service, and electronic security which include security alarms, access control and closed circuit camera op ons.
My-Pulse IoT Solutions Ltd. Belleville, St. Michael, Barbados +1 (246) 431-2774 www.my-pulse.com Contact: Neil Owen
OHZ Security Brooklyn, NY (212) 671-3355 www.ohzsecurity.com Contact: Isaac Feldman
My-Pulse.com IoT Solutions Ltd. is a company that provides monitoring and call center services to Barbados and multiple Caribbean countries which includes residential and commercial clients. Through symbiotic relationships and innovative technology, we are a proven reliable regional safety and security provider.
Monitoring consultants stationed in NYC and surrounding areas, OHZ began with the initiative to protect differently and prepare creatively. Specializing in security systems for commercial facilities and construction sites, state of the art data centers are combined with human perception for macho that speaks tech.
www.tma.us TMA Dispatch | 19
TMA Five Diamond Member Companies These monitoring centers have received or renewed their TMA Five Diamond designations since the publication of the Fall 2019 issue of Dispatch. TMA applauds their commitment to the highest training standards in the monitoring industry. For a complete, up-to-date list of TMA Five Diamond companies, visit www.tma.us.
Company
ADT JCTX Alarmco, Inc. AT&T Digital Life Barcom Security, Inc. Bay Alarm Company Brinks Home Security Electronic Security Corp. of America Engineered Protection Systems, Inc Guardian Alarm Systems Huronia Alarm & Fire Security, Inc. Kroger Central Alarm Control Matson Alarm Co Inc. Metrodial Corporation National Monitoring Center National Monitoring Center (TX) Paladin Technologies Post Alarm Systems Richmond Alarm Company Securitas Electronic Security, Inc. (HI) Sentry Watch, Inc. Siemens Industry, Inc. Sony Pictures Entertainment Stanley Security Canada The Church of Jesus Christ of Latter-day Saints The Watchlight Corporation United Monitoring Services, Inc. Universal Atlantic Systems, Inc. Vivint (MN) Vivint (UT) Washington Alarm, Inc.
City
Irving Las Vegas Farmers Branch Swansea Concord Farmers Branch Woodlyn Grand Rapids Shreveport Midland Portland Fresno Hicksville Lake Forest Irving Burnaby Arcadia Midlothian Honolulu Greensboro Irving Culver City Montreal Salt Lake City El Cajon Columbus Paoli Eagan Provo Seattle
State TX NV TX IL CA TX PA MI LA ON OR CA NY CA TX BC CA VA HI NC TX CA QC UT CA GA PA MN UT WA
Date Certified since 10/2014 since 06/2006 since 07/2013 since 11/2007 since 01/2006 since 02/2005 since 05/2009 since 06/2004 since 08/2017 since 06/2013 since 07/2015 since 06/2008 since 11/2004 since 06/2016 since 06/2016 since 04/2008 since 12/2014 since 06/2017 since 12/2003 since 02/2008 since 03/2004 since 05/2014 since 10/2011 since 05/2012 since 03/2014 since 04/2004 since 03/2004 since 03/2014 since 03/2014 since 12/2006
Website
www.adt.com www.alarmco.com www.att.com/digitallife/experience www.barcomsecurity.com www.bayalarm.com www.brinkshome.com www.electronicsecuritycorp.com www.epssecurity.com www.guardianalarmsystems.com www.huroniaalarms.com www.kroger.com www.matsonalarm.com www.metrodial.com www.nmccentral.com www.nmccentral.com www.paladinsecurity.com www.postalarm.com securityalliance.us www.securitases.com www.sentrywatch.com www.siemens.com www.spe.sony.com www.microtec.ca www.churchofjesuschrist.org www.watchlight.com www.ums247.com www.uas.com www.vivint.com www.vivint.com www.washingtonalarm.com
What if... SIAC Didn’t Exist? The important work our team undertakes each day across our country on behalf of the security industry is solely and generously supported by donations from industry associations, and manufacturers, and others. To continue to fulfill our mission, we need your help.
Support SIAC. Donate today at www.siacinc.org 20 | TMA Dispatch ď Ź www.tma.us
Fall 2019
REGULATORY UPDATE
John Prendergast jap@bloostonlaw.com
Chairman Pai Announces Plan to Maintain Radiofrequency Exposure Safety Standards
On August 8, FCC Chairman Ajit Pai announced a “proposal that would continue to ensure the health and safety of workers and consumers of wireless technology.” The proposal, which has begun circulation among the other Commissioners, would maintain the FCC’s existing radiofrequency (RF) exposure limits and also establish a uniform set of guidelines for ensuring compliance with the limits regardless of the service or technology, replacing the FCC’s current inconsistent patchwork of service-specific rules. In addition, Chairman Pai is proposing that the FCC seek comment on establishing rules formalizing its existing methods of determining compliance with the RF exposure standard for highfrequency devices. The draft item includes these main components: • Maintaining the current standard: The item would maintain the existing RF exposure limits and thus resolve the FCC’s 2013 Notice of Inquiry that sought public input on whether to strengthen or relax its existing RF exposure limits. • Establishing uniform rules for determining compliance with RF standards: The item would establish a uniform set of guidelines, agnostic to the service
Fall 2019
or technology, using sciencebased metrics around frequency, distance, and power, to determine how entities assess whether they are in compliance with RF standards. • Formalizing the application of the existing standard to certain frequencies: The item would seek comment on establishing a rule to formalize the FCC’s existing methods of determining compliance with the RF exposure standard for devices operating at high frequencies. “The FCC sets radiofrequency limits in close consultation with the FDA and other health agencies. After a thorough review of the record and consultation with these agencies, we find it appropriate to maintain the existing radiofrequency limits, which are among the most stringent in the world for cell phones,” said Julius Knapp, chief of the FCC’s Office of Engineering and Technology. On November 18, 2013, AICC filed Reply Comments in this proceeding, urging the FCC to (1) apply any RF rule changes on a prospective basis only; (2) retain the existing servicebased exemption for Private Land Mobile Radio Service licensees, even if the proposed “uniform” exemption is adopted; (3) adopt the proposed uniform exemption only as an option, and with appropriate safeguards; (4) adopt a 2-watt blanket exemption option; (5) ensure that alarm companies can continue to install customer-premise radios as “mobiles” without the need to make public the protected premise location; (6) develop workable and common sense criteria for multiple antenna situations, and refrain from imposing liability on radio operations if subsequent site users cause a non-compliance situation; (7) refrain from adopting signage/ notification requirements that would create undue public concern; and (8) ensure that any revisiting of the current RF emission standards allow the new requirements adopted in this proceeding to be implemented, the results evaluated, and the compliance costs recovered.
The actual draft order won’t be available until the September agenda (or later if this draft is not on that agenda). We will determine at that time how AICC’s proposals are being addressed, although it appears at first blush (based on the news release) that the industry does not have to worry about retroactive application of a tougher standard; however, it appears that the FCC continues to want uniform, onesize-fits-all rules for determining compliance with RF standards. We will review for any impact on the service-based exemption for Private Land Mobile Radio Service licensees, such as alarm license holders.
FCC Initiates Probe to Test Whether Certain Smart Phones Produce Too Much RF Radiation
The Chicago Tribune has reported that it completed testing of 11 smart phones from four different manufacturers and noted, in particular, that measurements from the Apple iPhone 7 exceeded the legal safety limit and was more than double what Apple had previously reported to the FCC in its testing results. It was further noted that when testing a new phone for compliance with FCC RF radiation limits, the phone may be positioned up to 25 millimeters from the body – which is nearly an inch – depending upon how the device will be used, since the testing standards were developed in the 1990s when most people put the devices in belt clips or holsters. Today, phones are carried closer to the body – frequently in pockets. The Chicago Tribune performed two series of tests. In the first series, the Chicago Tribune positioned the phones at the same distance from simulated tissue that manufacturers used for their testing – which ranged from five to 15 millimeters. In the second series of testing, the phones were placed two millimeters closer to the tissue (and less than the maximum distance allowed by the FCC). At two millimeters closer, www.tma.us TMA Dispatch | 21
REGULATORY UPDATE the RF emissions from the Samsung Galaxy S8 were reportedly more than five times the standard. ZD Net stated that the Samsung Galaxy S9 and Galaxy J3 were also implicated. The FCC is reviewing the Chicago Tribune test results and will conduct independent testing to verify its results. FCC spokesperson Neil Grace stated that “We take seriously any claims on non-compliance with the RF (radio frequency) exposure standards and will be obtaining and testing the subject phones for compliance with FCC rules.” Apple has denied that its phones violate the FCC’s RF exposure limits, claiming that the test methodology did not properly assess the iPhones. In that regard, Apple stated that all of its iPhones were “fully certified” by the FCC. Apple has also told the press that “[a]fter careful review and subsequent validation of all iPhone models tested in the [Tribune] report, we confirmed we are in compliance and meet all applicable … exposure guidelines and limits.” ZD Net and Apple Insider are reporting that Apple and Samsung are now subjects of a class action lawsuit based upon the Chicago Tribune report. The lawsuit was filed in the US District Court for Northern California two days following release of the report. Alarm companies that provide employees with cell phones should determine whether they wish to instruct affected employees to replace any Apple iPhone 7 or Samsung Galaxy devices implicated in the Chicago Tribune study, or take any other measures to address this matter, pending completion of the FCC probe.
Changes to Tower Marking and Lightening Rules May Be Coming with Increased Costs In 2018, Congress amended the FAA Extension, Safety and Security Act of 2016, which among other things, required improved physical obstruction marking and lighting on all small to medium sized towers
22 | TMA Dispatch www.tma.us
(between 50 feet and 200 feet above ground level). This legislation was designed to protect low-flying aircraft – such as crop dusters – from temporary meteorological testing towers and other structures that may not be subject to FCC marking and lighting review. FCC Commissioner Michael O’Rielly expressed concern that the language in the 2016 Act was overbroad; and “[i]f implemented literally, the provision will force expensive retrofits to potentially 50,000 existing towers, such as wireless communications and certain broadcast towers, all new towers that meet the broad definition, and raise tower prices for the next generation of wireless services – all with little gain to air safety.” The 2018 Act amended Section 2110 by providing an alternative for compliance with respect to certain types of towers. Under the 2018 Act, a “covered tower” is any structure that is (a) a meteorological evaluation tower, a self-standing tower or a tower supported by guy wires and ground anchors; (b) 10 feet or less in diameter at the above-ground base (excluding the concrete ground footing) and (c) at least 50 feet above ground level, but not more than 200 feet above ground level. The covered tower must have accessory facilities on which an antenna, sensor, camera, meteorological instrument or other equipment is mounted, and be located on land that is either in a rural area or used for agricultural purposes, or immediately adjacent to such land. Covered towers (other than meteorological evaluation towers) will have to be either obstruction marked and lighted in accordance with specifications recommended by the FAA, or be included in an FAA database that includes the location and height of each covered tower that the owner or operator elects not to mark (unless the Administrator has determined that there is a significant safety risk requiring that the tower be marked).
The FAA is in the process of preparing proposed rules to implement these new tower requirements, which rule proposal is expected later this fall. While the FAA’s staff has informally indicated that the proposed obstruction marking and lighting rule changes are not intended to affect radio towers, the final paragraph in Section 576 of the 2018 Act indicates that the FCC will be required to amend Rule Section 17.7 in order to require notification to the FAA for any construction or alteration of an antenna structure that would qualify as a “covered tower.” We believe that this change is designed to assist the FAA in implementing its database requirement as described above. However, there is room for concern that new expenses could be coming for telecom towers as a result. If an alarm service provider is providing wireless alarm operations in undeveloped areas (perhaps remote military bases, government facilities, etc.), then it may be more likely to utilize a small tower rather than a rooftop mounted antenna. If so, the new regulations may ultimately require marking and lighting not currently required by FCC regulations.
FCC Grants Echodyne Corp Request for Waiver to Permit Ground-Based Radiolocation Use of its Security and Surveillance Radar for Detection of Drones, Etc. The FCC recently granted a request by Echodyne Corp for a limited waiver of the Commission’s Rules to permit ground-based radiolocation use of its EchoGuard (formerly MESA-SSR) security and surveillance radar. The limited waiver request is subject to significant limitations and the outcome of a pending rulemaking petition that proposes to establish
Fall 2019
REGULATORY UPDATE Regulatory Update, cont. from page 21
permanent rules for secondary use of the 24.45-24.65 GHz band for radiolocation operations. Echodyne markets the EchoFlight (formerly MESA-DAA) radar that operates in the 24.45-24.65 GHz band for airborne radionavigation use in unmanned aircraft systems (UAS) to detect and avoid obstacles. Echodyne states that others have expressed interest in using the device for ground-based security and surveillance radiolocation, so the company developed the EchoGuard, a low-power, low-cost, small radar that is optimized for ground-based use but uses the same frequency band and core technologies as the EchoFlight. Potential uses of the EchoGuard include UAS detection at sensitive sites, such as prisons and stadiums, or ground perimeter surveillance at borders and other locations. Alarm companies concerned with protected against drone intrusion may want to explore this technology. In granting the waiver request, the FCC determined that allowing use of the band for other UAS detection purposes would serve the public interest, since UAS detection is an important public safety function.
FCC Signals Plan to Start 3.5 GHz 5G Auction June 25, 2020
In a blog post issued recently, FCC Chairman Ajit Pai announced plans for the Commission to vote later this month on issuing draft procedures for the auction of 70 MHz of “Priority Access License” (or “PAL”) spectrum in the 3.5 GHz band, with the auction to begin on June 25, 2020. This next batch of 5G spectrum is touted to feature better signal propagation, building penetration and ability to serve mobile applications than the spectrum sold in recent 5G auctions. While not offering the same bandwidth capacity as some of the earlier auctions, 3.5 GHz may serve as either a stand-alone 5G opportunity or a tool to supplement
Fall 2019
higher band 5G offerings. Spectrum Access System (SAS) administrators including Federated Wireless, CommScope and Google are expected to have their final test reports approved by the Commission in the coming weeks and this paves the way for initial commercial deployments using the unlicensed General Authorized Access (or “GAA”) portion of the CBRS band to begin later this month. Taken together with the Chairman’s announcement, these developments mean that the long-awaited 3.5 GHz Citizens Broadband Radio Service (“CBRS”) will soon be reality for our clients who wish to deploy 4G LTE and/or 5G networks using valuable mid-band spectrum. The FCC has come under some criticism from the wireless industry recently for focusing its initial 5G spectrum licensing efforts on the millimeter wave “Spectrum Frontiers” bands, such as the 28 GHz band (Auction 101 - which ended in late January) and 24 GHz band (Auction 102 - which ended in late May), rather than clearing and auctioning mid-band spectrum, which has significantly less capacity but which has more favorable propagation characteristics for covering wide areas. The Commission is proceeding with another Spectrum Frontiers auction (Auction 103 - for PEA licenses in the Upper 37 GHz, 39 GHz and 47 GHz bands) that is scheduled to begin December 10th. Short-form applications for Auction 103 were due by September 9. The revised 3.5 GHz PAL licensing framework improves upon the 3650-3700 MHz Band Service by offering an additional 100 megahertz of contiguous spectrum, and allowing greater frequency protection for county-based PAL licensees. There will also be 3.5 GHz spectrum made available for unlicensed operations, albeit with reduced protections. Regardless of whether members of the alarm industry decide to seek 3.5 GHz spectrum at auction
or for unlicensed use, the industry should evaluate the usefulness of this spectrum for future 5G alarm applications, especially those requiring better building penetration or mobility aspects.
New Legislation H.R.3375 – Stopping Bad Robocalls Act Sponsor: Rep. Frank Pallone, Jr. [D-NJ-6] (Introduced 6/20/2019) Committees: House - Energy and Commerce Committee Reports: H.Rept. 116-173 Latest Action: Senate - 07/25/2019 Received in the Senate. This bill generally requires the FCC to adopt such regulations as it deems necessary to ensure the consumer protection and privacy purposes of the § 227 of the Communications Act (a.k.a the TCPA). Beyond this general requirement, the bill includes several specific actions relevant to the alarm industry: Section 3 revises the TCPA to clarify that if the FCC adopts an exemption to the TCPA pursuant to section 227(b)(2), then it must expressly include limitations on the classes of parties that are exempt, the classes of customers that are exempt, and the number of times calling parties may make calls to particular called parties. The FCC has granted a few exceptions using its authority under 227(b)(2), including certain financial-related calls and certain healthcare-related calls. This section would require increased specificity when it comes to these types of exemptions. Section 4 clarifies that the term “called party” refers to the current subscriber or customary user of the line, not the person the caller is intending to call. The FCC adopted this definition along with a “one-call safe harbor,” but the Court of Appeals overturned www.tma.us TMA Dispatch | 23
REGULATORY UPDATE both findings. AICC has taken a stance against this interpretation of the term “called party” because it puts the onus of determining whether a number has been reassigned on the alarm company making the call. Section 5 eliminates the citation requirement before the FCC can issue forfeitures for violation of the TCPA, and extends the statute of limitation for such forfeiture assessments to four years. This makes it easier for the FCC to issue forfeitures for robocalls on its own accord. It is separate from the civil penalty that creates grounds for the lawsuits we have seen. Section 7 requires the FCC to adopt regulations to require the implementation of call authentication technology, and to adopt regulations to permit callers to block calls from unauthenticated numbers and take “reasonable steps” to ensure no calls are wrongly blocked because they originate from a carrier that is exempt from implementing authentication. The FCC has already made clarifications similar to what is required in the legislation, and AICC has filed a petition for reconsideration requesting certain clarifications. The FCC has also sought comment on how to further implement call blocking services, and AICC filed comments. Section 8 requires the FCC to take final agency action to ensure robocall blocking services provided on an optin or opt-out basis, as contemplated in the current call blocking proceeding, are provided with transparency and effective redress options for consumers and callers, at no additional line-item cost. Transparency and redress options are of critical importance to the alarm industry. In its Petition for Reconsideration, AICC argued to the FCC that direct notifications to customers for opt-out call blocking were necessary to promote transparency, and also raised transparency concerns regarding how carriers offering alarm services might treat non-affiliated alarm services differently. In its comments in the NPRM proceeding, AICC urged the Com24 | TMA Dispatch www.tma.us
mission to ensure there were effective redress options for customers and central stations to be able to get off block lists as soon as possible. H.R.3836 - Wireless Infrastructure Resiliency During Emergencies and Disasters Act Sponsor: Rep. Anna G. Eshoo [D-CA-18] (Introduced 07/18/2019) Committees: House - Energy and Commerce Latest Action: House - 07/18/2019 Referred to the House Committee on Energy and Commerce. Amends § 332(c)(3)(A) of the Communications Act, which prohibits State and local government from having any authority to regulate the entry of or the rates charged by any commercial mobile service or any private mobile service by clarifying that they may regulate other terms and conditions of commercial mobile services, including reasonable requirements to promote resilient wireless communications infrastructure for situational awareness during a natural disaster. State and local governments could already regulate “other terms and conditions” besides entry and rate, so the language proposed here appears to be more for clarification than substantive revision to the law. Nevertheless, with specific language in the Act protecting State and local governments’ right to impose resilience requirements on communications infrastructure, more may be forthcoming. This may impact the service provided to alarm companies, perhaps for the better in terms of resiliency, but could lead to higher costs.
S.2223 – AIRWAVES Act Sponsor: Sen. Cory Gardner [R-CO] (Introduced 07/23/2019) Committees: Senate - Commerce, Science, and Transportation Latest Action: Senate - 07/23/2019 Read twice and referred to the Committee on Commerce, Science, and Transportation. This bill requires the Federal Communications Commission (FCC) to complete auctions during each of the next three calendar years that will grant new broadcast licenses 500 MHz of spectrum in frequency spectrum bands below 6 GHz. For the auctioned spectrum, the FCC cannot cause unreasonable interference with incumbents. The FCC must also make available, by means unspecified, another 500 MHz above 500 GHz. There is no apparent protection for incumbents here. Spectrum identified for these auctions may include unlicensed spectrum that may impact alarm operations. Fortunately, provisions are included for incumbent protection, but it will be necessary for the Alarm Industry to monitor for interference and seek redress if necessary. S.2204 - DART Act of 2019 Sponsor: Sen. Mike Crapo [R-ID] (Introduced 07/23/2019) Committees: House - Energy and Commerce Committee Reports: H.Rept. 116-173 Latest Action: Senate - 07/23/2019 Read twice and referred to the Committee on Commerce, Science, and Transportation. This bill empowers the FCC to carry out a pilot program under which voice service providers could block Fall 2019
REGULATORY UPDATE calls through the “use data analytics and caller identification authentication procedures,” and would not be liable if a lawful call is blocked if they were acting in good faith. It also provides for a list of numbers that may not be blocked that includes any numbers used by PSAPs or a similar facility used to originate or route emergency calls; government calls; and schools or similar institutions. The FCC has already ruled that carriers may block calls based on certain analytics, and has provided clarification on the steps carriers that block calls must take to avoid liability. The FCC is also seeking comment on a Critical Calls list similar to the list called for in this bill, and has supported the inclusion of alarm industry members thereon. It may be advisable to pursue similar support for alarm industry inclusion in the exempt list, in the legislation itself.
Updated Legislation S.151 – TRACED Act Sponsor: Sen. John Thune [R-SD] (Intoduced 01/16/2019) Committees: Senate - Committee on Commerce, Science, and Transportation | House - Energy and Commerce Committee Reports: S.Rept. 116-41 Latest Action: House - 05/24/2019 Referred to the House Committee on Energy and Commerce This bill provides the FCC with authority to issue additional civil penalties of up to $10,000 per call on those individuals who intentionally violate the TCPA, and extends the statute of limitations for such violations from 1 year to 3 years, and eliminates the citation requirement for such violations. The bill also directs the FCC to require voice service providers to implement the STIR/SHAKEN authen-
Fall 2019
tication framework and to develop rules pertaining to a safe harbor for voice service providers that inadvertently block legitimate callers under a STIR/SHAKEN protocol and have used reasonable care, and allowing parties adversely affected to verify the authenticity of their calls. It also requires the FCC to conduct a rulemaking regarding methods to protect subscribers from receiving AICC recently filed comments in the FCC’s rulemaking proceeding on call blocking, opposing any safe harbor for carriers that block calls on an opt-in basis. This legislation would support the implementation of such a safe harbor, and should be opposed. H.R.2298 - Repeated Objectionable Bothering Of Consumers On Phones Act Sponsor: Rep. Jackie Speier [D-CA-14] (Introduced 04/12/2019) Committees: House - Energy and Commerce Latest Action: House - 04/30/2019 Subcommittee Hearings Held This bill requires the FCC to establish by regulation technical and procedural standards that require providers to verify that caller identification information being transmitted is accurate, unless the consumer requests it to be blocked. The FCC must also establish standards to require receiving providers to block unverified calls or texts or otherwise identify them as likely coming from an automated dialer. There is an exception that prohibits blocking PSAPs and emergency operations centers, however. This legislation is much less specific than other pieces of robocall legislation, with the corollary being that the FCC has much more flexibility in implementing it. As we have discussed, the FCC is already heading down this path in the absence of legislation.
H.R.2355 - Regulatory Oversight Barring Obnoxious Calls and Texts Act of 2019 Sponsor: Rep. Anna G. Eshoo [D-CA-18] (Introduced 04/25/2019) Committees: House - Energy and Commerce Latest Action: House - 04/30/2019 Subcommittee Hearings Held This bill would require the FCC to create a within the Enforcement Bureau of the Commission a division that specifically addresses the issue of robocalls. A division dedicated to robocall issues could potentially offer a faster route toward resolving call blocking issues.
No Update H.R.1644 - Save the Internet Act of 2019 Sponsor: Rep. Michael F. Doyle [D-PA-18] (Introduced 03/08/2019) Committees: House - Energy and Commerce Committee Reports: H.Rept. 116-34 Latest Action: Senate - 04/29/2019 Read the second time. Placed on Senate Legislative Calendar under General Orders. Calendar No. 74. Roll Call Votes: There have been 5 roll call votes. The Save the Internet Act would purportedly restore several aspects of Title II regulation to broadband internet access service, including: Prohibition of “unjust and unreasonable practices” (Sections 201 and 202); Investigation of consumer complaints under section 208 and related enforcement provisions (Sections 206, 207, 209, 216 and 217); Protection for consumer privacy (Section 222); Fair access to poles and conduits (Section 224); Protection for people with disabilities (Sections 225 and 255);
www.tma.us TMA Dispatch | 25
REGULATORY UPDATE and Universal service fund support for broadband service in the future (partial application of Section 254). These provisions could reasonably provide some protection to alarm companies from predatory practices by competitors who also offer broadband Internet access services. H.R.1954, S.952 - Cellphone Jamming Reform Act of 2019 Sponsor: Rep. David Kustoff [R-TN-8] (Introduced 03/28/2019) Committees: House - Energy and Commerce Latest Action: House - 03/28/2019 Referred to the House Committee on Energy and Commerce. Sponsor: Sen. Tom Cotton [R-AR] (Introduced 03/28/2019) Committees: Senate - Committee on Commerce, Science, and Transportation Latest Action: Senate - (03/28/2019) Read twice and referred to the Committee on Commerce, Science, and Transportation These companion bills would prohibit the FCC from preventing a State or Federal correctional facility from utilizing jamming equipment. AICC members have historically experienced issues with prison cell jammers jamming signals outside the prison, in particular alarm signals. The bill provides that jamming must be limited to the housing facilities of the correctional facility, but precise limitations have proven difficult to implement. This language is not likely sufficient to protect alarm company customers. H.R.1818 - Kelsey Smith Act Sponsor: Rep. Ron Estes [R-KS-4] (Introduced 03/18/2019) Committees: House - Energy and Commerce 26 | TMA Dispatch www.tma.us
Latest Action: House - (03/18/2019) Referred to the House Committee on Energy and Commerce. This bill amends the Communications Act to require providers of a covered service to provide location information concerning the telecommunications device of a user of such service to an investigative or law enforcement officer or an employee or other agent of a public safety answering point in an emergency situation involving risk of death or serious physical harm or in order to respond to the user’s call for emergency services. AICC will want to monitor this legislation and participate in any effort to implement it, as necessary. H.R.2136 - Open Internet Preservation Act Sponsor: Rep. Lloyd Smucker [R-PA-11] (Introduced 04/08/2019) Committees: House - Energy and Commerce Latest Action: Senate - 04/08/2019 Referred to the House Committee on Energy and Commerce This bill essentially codifies the no-block and no-throttling Open Internet rules that the FCC overturned. These rules are important to AICC’s members because several major ISPs those members rely on to transmit their alarm data also offer competing alarm services. Being able to block or degrade competitor’s data would put them at a substantial competitive advantage. S.1212 - ROBOCOP Act Sponsor: Sen. Richard Blumenthal [D-CT] (Introduced 04/11/2019) Committees: Senate - Committee on Commerce, Science, and Transportation Latest Action: Senate - (04/11/2019) Read twice and
referred to the Committee on Commerce, Science, and Transportation The purpose of this bill is to amend the Communications Act to expand and clarify the prohibition on inaccurate caller identification information and to require providers of telephone service to offer technology to subscribers to reduce the incidence of unwanted telephone calls and text messages. In particular, the bill requires communications providers to offer the option to enable technology that to that identifies an incoming call or text message as originating or probably originating from an automatic telephone dialing system and prevents the subscriber from receiving a call or text message so identified unless (a) the call or text message is made or sent by a public safety entity, including a public safety answering point, emergency operations center, or law enforcement agency; or (b) the subscriber has provided prior express consent to receive the call or text message and has not revoked that consent. AICC will want to participate in any associated FCC rulemaking to assure that alarm companies’ automated messages are not incorrectly blocked by carriers under the technology proposed here. The FCC is currently making progress on allowing carriers to block calls for customers, and AICC will want to participate in those proceedings as well. H.R.451 - Don’t Break Up the T-Band Act of 2019 Sponsor: Rep. Lloyd Smucker [R-PA-11] (Introduced 04/08/2019) Committees: House - Energy and Commerce Latest Action: House - 01/25/2019 Referred to the Subcommittee on Communications and Technology Wireless Report, cont. on page 30
Fall 2019
REGULATORY UPDATE
Wireline Report Mary J. Sisak mjs@bloostonlaw.com
AICC Asks FCC to Clarify/ Reconsider Call Blocking Declaration Ruling AICC filed a Petition asking the FCC to clarify and/or reconsider certain aspects of its Declaratory Ruling in which the FCC clarified that voice service providers may offer consumers programs to block unwanted calls through analytics on an opt-out basis. AICC asked the FCC to clarify that: (i) direct customer notification of call-blocking programs is necessary; (ii) that alarm company notifications are the type of emergency communication the Commission cautions voice service providers must safeguard; and (iii) that voice service providers must implement any call-blocking program in a non-discriminatory fashion. Specifically, AICC urged the Commission to clarify that disclosing information regarding opt-out callblocking programs by “featuring such information prominently on their websites to allow consumers to research and compare the available options” is not, on its own, sufficient to ensure customers have notice and the information they need to make an informed choice about participating in such programs. AICC argued that the Commission should clarify that disclosing information on a carrier’s website in addition to direct notification, such as texts, email, or inserts in customer bills, is necessary and proper. AICC asked the FCC to clarify that its caution to voice service providers to “avoid blocking calls from ‘public safety entities, including PSAPs, emergency operations centers, or law enforcement agencies’” includes calls from alarm companies. Finally, AICC asked the FCC to
Fall 2019
clarify that voice service providers must implement any call-blocking program in a non-discriminatory way with respect to non-affiliated alarm companies. AICC argued that alarm companies are dependent on voice service providers for the underlying communication service used to provide critical alarm services. At the same time, many voice service providers also provide alarm services and AICC’s members face intense competition from them and/or their alarm provider affiliates. AICC asked the FCC to make clear that voice service providers must use the same level of care not to block unaffiliated alarm company calls that they take to ensure affiliated alarm company calls are not blocked.
AICC Files Comments and Reply Comments Regarding Call- Authentication and Call Blocking AICC filed comments and reply comments on the FCC’s Further Notice of Proposed Rulemaking (FNPRM), in which the FCC asked for comment on additional steps to protect consumers from illegal calls by proposing rules to allow voice service providers to block calls based on Caller ID authentication in certain instances. In its comments, AICC urged the Commission to ensure that calls to and from alarm central stations are never blocked by voice service providers. AICC argued that any Critical Call List that is developed should include outgoing numbers used by alarm companies to notify emergency personnel and consumers of an alarm incident, and to confirm that emergency services are, in fact, required. Further, consumers and alarm companies must be able to easily remove themselves from any call blocking programs before they are implemented by voice service providers and they must be able to easily correct any errors made by the voice service provider when blocking calls.
Because call blocking by the voice service provider will not be 100% accurate, AICC stated that the consumer must be the one to determine whether they are willing to risk allowing the voice service provider to block calls that the voice service provider believes, but does not know, are fraudulent, with the knowledge that by doing so the consumer risks their personnel safety and the safety of their property. AICC argued that there should be no “safe harbor” for voice service providers that make this determination for the consumer and are wrong. AICC also asked the Commission to make clear that voice service providers apply equal treatment to unaffiliated alarm companies. In addition to a Critical Call List, AICC asked the Commission to require voice service providers to identify and make available to unaffiliated alarm companies all of the protections and methods they make available to their own alarm services to avoid mistaken call blocking and to resolve a call-blocking issue when it is identified. In reply comments, AICC noted that the comments make clear that SHAKEN/STIR on its own is not suitable for call blocking and that even when combined with analytics, the voice service providers have acknowledged they will block lawful and wanted calls. Accordingly, AICC stressed that calls from alarm central stations should never be blocked. AICC supported a single, centralized Critical Call List operated or overseen by the FCC. AICC also asked the FCC to require voice service providers to publicly identify contact numbers where individuals can be reached 24 hours a day, seven days a week, who can quickly correct any case when a number is incorrectly blocked. AICC argued that voice service providers should not be given a broad safe harbor from liability when they block lawful calls and that a safe harbor should Wireline Report, cont. on page 28
www.tma.us TMA Dispatch | 27
Wireline Report, cont. from page 27
not be considered until there is more experience with the blocking mechanisms that will be employed. AICC also supported proposals directed at the perpetrators of unlawful robocall schemes and the voice service providers that facilitate them.
AICC Submits Letter to Conference Committee Regarding Robocall Legislation AICC submitted a letter to the House and Senate conferees of the “Telephone Robocall Abuse Criminal Enforcement and Deterrence Act” (S. 151, or the “TRACED Act”) and the “Stopping Bad Robocalls Act” (H.R. 3375) to express its concern about voice service providers blocking calls without the customer’s consent and without protections for alarm company calls. AICC stated that to ensure “emergency calls” are not blocked, voice service providers that block calls should be required to maintain a “Critical Call List” of numbers they may never block, including alarm company numbers. If an alarm company’s outgoing number is blocked, AICC stated that the company should receive some type of notice when placing the outbound call so that corrective action can be taken immediately. AICC also argued that any protection from mistaken call blocking provided by voice service providers to their alarm affiliates should be made available to unaffiliated alarm companies in equal measure.
AT&T to Deploy Automatic Call Blocking AT&T announced that it will deploy automatic call blocking to consumer customers in light of the FCC’s recent Declaratory Ruling clarifying that voice service providers may offer consumers programs to block unwanted calls through analytics (call-blocking programs) on an opt-out basis. AT&T has stated that the call-blocking service will be provided with new AT&T Mobility
28 | TMA Dispatch www.tma.us
consumer lines and that call-blocking will be added “automatically” to the accounts of existing AT&T customers over the coming months. It is not clear if this program will be limited to AT&T Mobility consumer lines or if wireline customers also will have call-blocking automatically added to their accounts. In its Declaratory Ruling, the FCC dismissed arguments against opt-out blocking on the grounds that consumers want to receive calls from certain callers, such as alarm companies, finding that the ability to opt out of call-blocking programs addresses such concerns. To the extent calls from an alarm company’s numbers are blocked from reaching AT&T customers, the customers can “opt-out” of AT&T’s automatic call-blocking service. In addition, an alarm company that believes its numbers have been blocked in error can contact AT&T and ask that their numbers not be blocked. However, please be advised that there is no FCC mandated process to notify voice service providers that a number has been blocked in error.
FCC Approves Toll-Free Number Auction Procedures The FCC adopted bidding procedures for an auction of more than 17,000 toll-free telephone numbers in the new “833” toll-free code for which there have been competing requests. The FCC set an auction date of December 17, 2019. The auction will be managed by Somos Inc., which currently serves as the toll free numbering administrator and the North American Numbering Plan administrator. Bidders must demonstrate their interest by paying upfront fees of $100 per toll-free number, and registering for the auction by October 18. Under the rules of the auction, a number will go to the highest bidder, at the price offered by the runner-up bid. To prevent conflicts of interest and anticompetitive practices, bidders will be prohibited from discussing the auction, and will have to report to Somos on secondary market transfers of the auctioned toll-free
numbers. The auction application filing window will open at noon ET on October 7, 2019 and will close at 6 p.m. ET on October 18, 2019.
Service Quality Rules for Intermediate Providers Effective in September As part of the FCC’s efforts to improve call completion and rural call completion, the FCC’s rule requiring intermediate providers, entities in the call path of interexchange calls, to meet “service quality” standards becomes effective on September 15, 2019. As of that date, intermediate providers will have: (1) a general duty to complete calls; (2) a requirement to “actively monitor the performance of any directly contracted downstream intermediate provider and, based on the results of such monitoring, take steps to address any identified performance issues with that providers,” when routing traffic destined for rural areas; and (3) a requirement to ensure that any additional intermediate providers to which they hand off calls are registered with the Commission. The duty to complete calls means that intermediate providers “must promptly resolve any anomalies or problems that arise preventing call completion, and take action to ensure they do not recur.” With respect to performance monitoring, intermediate providers are required to both prospectively and retrospectively monitor their rural call completion performance.
FCC Action on Broadband Deployment in Multiple Tenant Buildings The FCC issued a Declaratory Ruling and a Notice of Proposed Rulemaking (NPRM) to improve broadband deployment and competition in multiple tenant environments (MTEs), such as apartment buildings, condominium complexes, and office buildings. Wireline Report, cont. on page 30
Fall 2019
Differentiate your Company By Offering Outdoor Video Monitoring By Charles Volschenk and Marti Balcells, Davantis Technologies
In an industry with many competitors, and a very short differentiation window, one way to stay ahead of the pack is to offer an outdoor video monitoring service, to your clients. How much better will it be to identify a perimeter breach or a potential building break-in about to happen - and to deter the perpetrator(s) before sustaining break-in damage, or the inevitable accompanying property loss? And if you thought the headache of dealing with false outdoor video alarms is not worth the additional value of the RMR stream, think again. Technology has now improved to the point where you can have accurate, dependable and affordable outdoor video detection solutions that are integrated into most central station software interfaces. Not all video monitoring is equal In general discussion, most monitoring providers will confirm that they do offer video monitoring services – often only for indoor applications. And not all the video monitoring offerings, are equal. Broadly speaking, three approaches exist. The first is to monitor live video camera feeds, and for an operator to raise alarm when an intrusion is observed. This is the most ineffective way to offer a video monitoring service, as it requires operators to view many cameras, for large periods of time, in the hope that they will observe an intrusion when it happens. The second is to use an intrusion system to raise an intrusion alarm, which is then visually verified by an operator using video. This is better than option one (above), but still has deficiencies. It is highly probable that by the time the operator has Fall 2019
linked to the video feed, the intruder has moved out of camera sight. And it often necessitates that the operator has to ‘search’ for an intruder over multiple cameras, wasting valuable time. The third (and best) option, is to use video analytic technology, to both detect intrusions, and raise an alarm at your central station. Outdoor video detection analytics performance has improved Video detection analytics has matured tremendously over the last few years. Two decades ago you could activate a very crude motion
detection analytic, with the main goal of extending storage capacity. But these analytics were ‘reasonable’ at best, and not reliable for accurate detection, especially outdoors. With the ever-increasing computational power of CPU’s, it later became possible to use video analytics for real time detection and alerts, using more advanced algorithms. These algorithms were able to model what it saw as the ‘background’, and to distinguish moving objects from the known background, tracking their path, and determining very roughly whether the objects were persons or vehicles. Even though these systems allowed defining of relatively complex detection rules, complicated scenes still yielded significant false alarms
(including false positives – which means detection of actual objects that were not supposed to trigger alarms i.e. animals). With even more advancements in machine-learning algorithms, detection accuracy was further enhanced, to the point where analytics could be deployed with success in most indoor and outdoor environments - as long as alarms were supervised by a human operator (locally or remotely). And with the drive towards continuous improvement, we are now at the point where reputable manufacturers/developers are using artificial intelligence and/or deep learning technologies, to reduce false alarms (and false positives) even further. And computation is getting better, also using GPU’s for higher processing capabilities. It is expected that in a few years’ time, these detection analytics will match or (probably) surpass the level of detection accuracy of a human operator. This is the expected future, but is not possible yet. Edge (camera) analytics vs Server-based analytics Video detection analytics is definitely the most appropriate technology for perimeter security, as it is the only technology that allows visual verification of intrusions, accurately and reliably. All other means of intrusion detection (no matter how accurate), eventually require that an operator/guard/law enforcement officer has to verify the intrusion visually. Most cameras on the market today, incorporate some built-in detection analytics. These are referred to as ‘edge’ analytics. Edge analytics are often suitable for indoor detection, under controlled lighting conditions and without environmental interference. Some may even be suitable for simple outdoor detection, over short distances. However most outdoor environments, pose big challenges to these edge device analytics. Outdoor Video Monitoring, cont. on page 30
www.tma.us TMA Dispatch | 29
Outdoor Video Monitoring, cont. from page 28
Poor lighting, camera shake/ vibration, adverse weather conditions, presence of bugs, vegetation clutter, are all very common factors which may generate false alarms. In order to overcome these challenges without compromising the detection accuracy, it is advisable to rely on the most advanced detection analytics technologies. For manufacturers is it faster to develop, and easier to deploy improvements to their algorithms in a server-based architecture. Furthermore, serverbased architectures are capable of delivering much more computational power, which enables the use of the latest, most advanced analytics algorithms based on deep learning/ artificial intelligence. These new algorithms are able to drastically decrease false alarms (and false positives), while maintaining exceptional detection accuracy and reliability. They offer significant parameter adjustment options, and are able to detect more accurately, and at much further distances. Compatibility with legacy systems Having outdoor video detection analytics linked to your central station software, also does not necessarily require an equipment change/upgrade. There are video detection analytics providers that offer bolt-on solutions, which work with all cameras (even analog), most VMS systems and all central station software brands. This provides you with an immediate upsell opportunity to existing customers, irrespective of what camera system brands they currently use. And your customers will thank you for the additional level of security, at very low additional cost. Simplicity of video alarm verification and response Even when you receive accurate outdoor video detection alarms, the speed and simplicity with which an operator verifies and responds to such an alarm, is often the
30 | TMA Dispatch www.tma.us
determining factor in successfully averting damage or loss. There are options on the market that will present video analytic alarms to your operators, in your existing intrusion alarm interface (with which your operators are familiar with). This reduces the need to train operators on more interfaces, and makes it easier when new staff are trained. Any video alarm should also immediately present a single video image, with a bounding box highlighting the cause (trigger) of the alarm, to an operator. Without this highlighting feature, your operator will waste valuable time trying to determine where in the image, the intrusion occurred – and may at times even dismiss the alarm as false. But if they are presented with a clear bounding box around the object that triggered the alarm, they can easily make an informed decision about the authenticity of the alarm (is it a human, is it a vehicle – or something else). And if the object in the bounding box is very small, or difficult to classify, the operator should be able to pull a short video clip, or to access on-site cameras live, with a single mouse-click – for better verification. Try before you buy Finally, be aware that all manufacturers/developers of video detection analytics will claim that they have a great product that is exceptionally accurate. And have you ever met with a provider that has not promised you great service and support? My advice is to request test equipment to do a trial run – preferably in a live environment. That will prove whether a product works accurately and dependably in a difficult environment. At that time, you will also get a good indication of the level of support that you can expect from the manufacturer/ developer.
Wireline Report, cont. from page 28
In past rulings, the FCC encouraged facilities-based competition by promoting access to customers but it has not required existing broadband providers to share their facilities with competitors to promote investment. In the Declaratory Ruling, the FCC clarified that states and localities may experiment to increase access to MTEs, consistent with federal law and policy. The FCC also preempted part of a San Francisco ordinance to the extent it requires the sharing of in-use wiring in MTEs. According to the FCC, “required sharing of in-use wiring deters broadband deployment, undercuts the Commission’s rules regarding control of cable wiring in residential MTEs, and threatens the Commission’s framework to protect the technical integrity of cable systems for the benefit of viewers.” In the NPRM, the FCC seeks comment on additional actions it could take “to accelerate the deployment of next-generation networks and services within MTEs.” The NPRM seeks comment on “the impact that revenue sharing agreements between building owners and broadband providers, exclusivity agreements regarding rooftop facilities, and exclusive wiring arrangements have on broadband competition and deployment.” REGULATORY UPDATE Wireless Report, cont. from page 26
H.R.451 - Don’t Break Up the T-Band Act of 2019 This bill would repeal Section 6103 of the Middle Class Tax Relief and Job Creation Act of 2012. This section provided that the FCC must reallocate the spectrum in the 470–512 MHz band (a.k.a. the “T-Band spectrum”), which is currently used by eligible public safety entities, by 2021. It is our understanding that several alarm companies operate in the T-Band. Accordingly, this bill deserves AICC’s support.
Fall 2019
Insurance Industry Trends - Are you at Risk? By Rob Tockarshewsky, Vice President, Property & Casualty
One of the latest insurance trends impacting businesses across the country is related to Directors & Officers liability and “Event Driven Litigation” (EDL) Risks. What is “Event Driven Litigation” (EDL) and why should I, as a business owner or company executive, care? EDL seeks to hold Company boards, senior management, and owners accountable for events that happened under their leadership. For instance, when a Cyber breach or privacy-related issue occurs, it is not just the company and its leadership that is faced with possible Cyber event costs, but D&O litigation concerns regarding their oversight of data and IT operations. Additionally, with the rise in the #MeToo and #TimesUp movements in particular, company owners are faced with the prospect of lawsuits arising from fostering a culture that tolerates (or rewards) sexual harassment or discrimination. Finally, the emergence of Climate Change as a major societal issue has given rise to a large number of lawsuits, with more than 1/3 of all climate-related actions and suits having been filed since 2015. Could EDL be impactful to my business? The financial implications, regardless of whether you’re are a small private business to a large publicly traded company, are enormous. In 2018, the average cost of a PRIVATE company D&O claim ranged from $400k - $1.3 million. In 2018, the median cost of a PUBLIC company D&O claim was estimated at $11 million. Fall 2019
Do not assume that just because your company has EPLI (Employment Practices Liability), General Liability and standalone Cyber Liability policies in place, that they afford you and your company coverage in all situations, especially as related to EDL risk to the entity and directors and officers. How do I address D&O EDL risk?? How does an individual or a company discern if their various insurance policies will properly address these emergent EDL threats? Specifically, how will a company D&O policy react? The first step is to consult your insurance professional and seek an EDL risk review. Review your policies regularly; Stay abreast of emerging industry and societal trends; Ensure your company policies and procedures are documented and strictly adhered to – these are introductory steps. Addressing EDL is an ongoing risk management function – for every organization and its leadership.
3 Trending Types of Event Driven Litigation (EDL): #MeToo and other “Employment” (PL) claims brought against a board of directors for breach of duty Cyber & Privacy event-related suits against a company’s Directors & Officers (post Breach event, ransomware, etc.) Climate and Environmental impact-related suits (both Climate Change and specific events) USI Insurance Services, a global insurance brokerage and risk management consultancy firm, monitors risk trends (both positive and negative) impacting businesses across the country. To learn more, visit www.usi.com/property-casualty/
www.tma.us TMA Dispatch | 31
Monitoring Center Operator Level 1 USA and international graduates completed May 1, 2019 to July 31, 2019 Training Graduates First Name Last Name
Company
Graduated
First Name Last Name
Company
Graduated
Kayla Kimberly Modinet Debra Mounir Asha Katy Julie Raymone Claire Angel Michael Esteban Julie Angela Yourrial Cody Andrew Travien Giannis Rhonda Kurt Lessa Mariam Nicki Elizabeth Megan Laura Kayleigh Jay Luis Willmary Elizabeth Melissa Maria Zach Danielle Jonathan Kimberly LaDonna James Arianna William Antonio Kim Anthony Patricia Bruce David Destinee Derrick Scott Mitchell Dhina Shanna Garrett Derek Caley Tiara Autumn Keith Tony Alan Gabriella Natasha Denise Ashlyn Jacob Aubrey Taylor Christine Brittany Michael Mark Tim Jamie Destiny Ethan Richaunda
Stanley Convergent Security Solutions, Inc. CenterPoint Technologies Interface Security Central Security Group Nationwide, Inc. ADT Canada Inc. (CA) Redwire Blue Ridge Monitoring Habitec Security Brinks Home Security The Monitoring Center (CA) Iverify.US, Inc. Vector WEST Allied Universal Security United Central Control Vivint, Inc. DMC Security Services, Inc. Hunter Security Inc BAE Systems Redwire Hellenic Central Station (GR) Central Security Group Nationwide, Inc. Tech Systems Inc Vyanet Operating Group, Inc. The Monitoring Center (CA) VRI Kings III of America Security Instrument Corporation Stanley Convergent Security Solutions, Inc. Operational Intelligence Center Avantguard Monitoring Centers Vivint, Inc. Genesis Security Services, Inc Stanley Convergent Security Solutions, Inc. Operational Intelligence Center Vivint, Inc. G4S Secure Integration LLC Redwire Wegmans Asset Protection Interface Security Blue Ridge Monitoring Avantguard Monitoring Centers Securitas Electronic Security Avantguard Monitoring Centers Vector EAST Habitec Security Alert 360 ADT ADT Safe Systems United Central Control Securitas Electronic Security Alert 360 Securitas Electronic Security Vivint, Inc. Alert 360 Operational Intelligence Center Tech Systems Inc Acadian Monitoring Services Habitec Security Security Solutions Inc. Vivint, Inc. Operational Intelligence Center Vivint, Inc Vivint, Inc. Interface Security Systems DGA Security American Burglary & Fire, Inc. Vyanet Operating Group, Inc. Midstate Security Company, LLC DMC Security Services, Inc. Vivint, Inc. Huronia Alarm & Fire Security, Inc. (CA) American Alarm & Communications, Inc. Vector EAST Atlas Security Service, Inc. Vyanet Operating Group, Inc. Interface Security The Protection Bureau DMC Security Services, Inc.
6/10/2019 5/9/2019 5/7/2019 5/24/2019 5/23/2019 6/19/2019 5/10/2019 6/12/2019 7/13/2019 6/14/2019 7/5/2019 7/23/2019 6/6/2019 7/9/2019 5/11/2019 6/22/2019 7/23/2019 7/1/2019 5/28/2019 5/27/2019 5/10/2019 6/15/2019 7/22/2019 5/22/2019 5/3/2019 5/28/2019 7/18/2019 6/27/2019 6/26/2019 5/9/2019 6/5/2019 5/3/2019 5/25/2019 6/29/2019 5/4/2019 6/18/2019 6/19/2019 5/21/2019 6/2/2019 7/17/2019 5/28/2019 7/5/2019 5/29/2019 5/28/2019 5/16/2019 6/20/2019 7/25/2019 6/27/2019 5/18/2019 7/8/2019 5/24/2019 5/13/2019 5/1/2019 5/9/2019 5/11/2019 6/19/2019 6/11/2019 7/11/2019 6/2/2019 6/12/2019 6/6/2019 6/27/2019 5/7/2019 7/22/2019 6/12/2019 7/11/2019 5/5/2019 7/29/2019 7/14/2019 6/25/2019 5/11/2019 5/1/2019 5/7/2019 5/30/2019 6/4/2019 7/27/2019 6/1/2019 6/12/2019 6/23/2019
Betty David Hunter Tammy Misty Jessica Ian Jennifer Nghia Megan Amanda Richard Jasmine Jan Joellyn Joseph Morgan Mark Peggy Johara Amberneisha Ryan Daniel Nancy Sierra Adam Crystal Navjit Stephanie Richard Ed Shonece Sara Keisha Michelle Daniel Dakota Zach Melissa Jazmine Luke Nathaniel Roland Elisa Stephanie David Marsha David Sean Peter Andrew Taylor Hatch Olivia Wulfgard Tanya Jasmine Dinish Chelseay Taylar Jessica Samuel Caleb Ren Nancy Natalie Katrina Nikisha Claudia Greg Greg Jessica Aracelli Jamie ShaDonna Brittany
ADT Operational Intelligence Center Vivint, Inc. Acadian Monitoring Services VRI Vivint, Inc. National Monitoring Center Security Equipment Inc Central Security Group Nationwide, Inc. The Protection Bureau Vivint, Inc. Puget Sound Energy Siemens Industry, Inc. ADS Security L.P. FE Moran Metrodial Corporation Kroger Central Alarm Control Simon Operational Intelligence Center Vivint, Inc. Genesis Security Services, Inc National Monitoring Center National Monitoring Center Kings III of America Interface Security Redwire Spectrum Security APSI-CENTERRA Paladin Technologies (CA) Centralarm Alert 360 Towne Monitoring Service Redwire Checkview Corporation TelscoSecurity Systems (CA) Alert 360 Brinks Home Security Vyanet Operating Group, Inc. THRIVE Intelligence Avantguard Monitoring Centers Avantguard Monitoring Centers Vyanet Operating Group, Inc. Interface Security United Central Control Brinks Home Security Valley Security & Alarm Turner Security Systems, Inc. Central Security & Communications Vivint, Inc. Avantguard Monitoring Centers Vivint, Inc. Vyanet Operating Group Inc. Comporium SMA Solutions Inc Paladin Technologies (CA) Northern911 (CA) Sentinelle Alarm (CA) Avantguard Monitoring Centers Comporium SMA Solutions Inc Interface Security Systems Interface Security Interface Security PasWord Protection (CA) Spectrum Security Vivint, Inc. Avantguard Monitoring Centers Alarmco Boise Operational Intelligence Center TelscoSecurity Systems (CA) Iverify.US, Inc. Interface Security Systems ATT Digital Life G4S Secure Integration LLC Security Service Company, Inc ADT Canada Inc. (CA) American Burglary & Fire, Inc. Interface Security Systems Acadian Monitoring Services
7/2/2019 6/29/2019 7/27/2019 7/26/2019 7/22/2019 5/31/2019 5/31/2019 6/30/2019 5/23/2019 5/1/2019 5/7/2019 7/18/2019 6/4/2019 7/1/2019 7/26/2019 6/1/2019 6/27/2019 6/19/2019 7/17/2019 5/21/2019 6/6/2019 5/1/2019 5/28/2019 6/27/2019 5/17/2019 5/17/2019 5/22/2019 7/16/2019 6/22/2019 6/5/2019 5/15/2019 5/31/2019 7/19/2019 5/13/2019 5/13/2019 7/30/2019 6/25/2019 5/14/2019 6/17/2019 5/8/2019 7/29/2019 5/24/2019 6/12/2019 7/13/2019 5/13/2019 5/22/2019 7/21/2019 7/31/2019 5/30/2019 7/31/2019 7/29/2019 7/2/2019 5/3/2019 5/30/2019 5/29/2019 5/1/2019 5/15/2019 6/12/2019 6/23/2019 7/27/2019 5/18/2019 5/17/2019 7/31/2019 5/1/2019 7/14/2019 6/19/2019 7/4/2019 7/8/2019 6/12/2019 7/9/2019 6/27/2019 7/17/2019 5/23/2019 5/4/2019 6/14/2019 6/19/2019
Abramson Adams Adebisi Adkinson Afolabi Akowe-Halsey Alberson Alexander Alexander Allan Anderson Anderson Andrade-Juarez Apodaca Armstrong Arrington Ashcraft Bahleda Baker Barbounakis Barker Barnes Barnett Barsoum Bassett Bates Berg Berthiaume Bilbrey Birch Blancas Boria Rosa Bosard Bowers Bradford Brammer Brown Brown Brown Brown Brunker Bull Burdett Burgos Calmes Campbell Cannell Carty Chapman Charles Childs Choate Cincurak Clement Cochnauer Coffey Colpitts Conklin Cordero Corley Cortez Crenshaw Cuellar Vargas Curtis Dallas Daniels Daves Davis Day Dean Dennison Desjardins Devine DiGiovanni Dimakos Dodd East Eberly Edwards
32 | TMA Dispatch ď Ź www.tma.us
Estrada Evans Ewing Fabre Ferguson Ferry Field Fisher Fisher Flaherty Flores Flores IV, CPP Flowers Fox Frain Friszell Frost Fry Fry Fuentes VĂĄzquez Galloway Galloway Garcia Garcia Garmon Gay George Gill Gimas Ginsburg Glassmyer Glenn Gnade Gosse Goudeau Grado Graves Green Greenhalgh Gruber Allen Guerin Guerrero Guerrero Gutierrez Gutierrez Guzman Guzman Hall Hall Hansen Hardcastle Harkey Hatch Hazlett Herard Hernandez Hicks Higgins Hill Hinton Hobe Hodge Holdaway Holtry Hoover Hoover Horchover Smith Horne Horton Horton Hosena Hosfeld Huamani-Diaz Hull Jennings Johnson
Level 1 Graduates, cont. on page 33
Fall 2019
First Name Last Name
Company
Graduated
Hillary Parish Brittany Logan Robert Jalen L
Johnstone Jones Kenner Kile Kimble Kincaid
6/20/2019 5/28/2019 6/1/2019 5/13/2019 5/6/2019
Ashley Sarita Stephanie Erica Grace Alexandra Amber Wendy Dennis Joli Teresa Kenneka Savannah Marisol James Lydia Lynnette Keandra Kate Judy Grace Armando Tyler
King King King Knox Kouadio La Gatta Lamoreaux Lanier Lavender Laws Leggott Liles Linnell Llanas Longhurst Lorraine Lotecki Lott Loya Luna Mafunga Maldonado Mallery
National Monitoring Center Ackerman Security Systems Vivint, Inc. THRIVE Intelligence Johnson Controls Safeguard Security a Division of SAFE Alarms Tech Systems Inc Interface Security Systems Vyanet Operating Group, Inc. Securitas Electronic Security Ackerman Security Systems The Monitoring Center (CA) Vivint, Inc. Securitas Electronic Security Wayne Alarm Systems, Inc. Avantguard Monitoring Centers PasWord Protection (CA) Siemens Industry, Inc. Vivint, Inc. United Central Control Vector EAST Paladin Technologies (CA) Paladin Security Group (CA) Interface Security Habitec Security Securitas Electronic Security TelscoSecurity Systems (CA) United Central Control Acadian Monitoring Services
Maria Mariah Johnita Stepfanie Carolyn Makensie Danekquia Michael Cherise Logan Joshua Jasmine Shannon Rome Adam Candace Kathryn Justice Tyneshia Mikayla Joel Thierry Ashleigh Paige Frank Sharinioka Erik Deja Ashley Dylan Briana Brock Cathy Teresa Darneisha Reid Patricia Anjelee Elizabeth Dennis Blake Eric Tara Olivia Tammy Rikki Demetria Ryan Matthew Christina Toiya Alicia Barbara
Mangallon Manzi Mayhane McBride McDonald McDonald Mcelveen McKee McKinght McLean Mellen Mena Meyer Meyers Miller Miller Miller Mitchell Mitchell Miyasaki Mompremier Montgomery Montonaro Montoya Moore Mora Moralez Moreno Morris Morrow Mowery Murray Nelson Nesby Neville Newton Norton Nunley Okeke Olenik Oliver Packer Pagan Palmer Pandori Passmore Pawlak Penalba Perales Perkins Pfaff Phillips
Huronia Alarm & Fire Security, Inc. (CA) Alarmco Hunter Security Inc TelscoSecurity Systems (CA) G4S Secure Integration LLC Vivint, Inc. Floyd Total Secuity Blue Ridge Monitoring Interface Security Systems Vivint, Inc. Operational Intelligence Center United Central Control TelscoSecurity Systems (CA) Avantguard Monitoring Centers Thrivent Financial Per Mar Security Services VRI Securitas Electronic Security Interface Security Vivint, Inc. ADT Canada Inc. (CA) COPS Monitoring - Maryland Security Alarm Corporation Vyanet Operating Group, Inc. Vivint, Inc. Peak Alarm Company Brinks Home Security Life Alert Emergency Response Blue Ridge Monitoring Vector WEST Operational Intelligence Center Habitec Security Stanley Convergent Security Solutions, Inc. National Monitoring Center VRI Paladin Security Group (CA) Vivint, Inc. Alert 360 Fire Monitoring of Canada Inc. (CA) Vivint Inc. Siemens Industry, Inc. Vivint, Inc. Alarmco Kings III of America Per Mar Security Services Securitas Electronic Security Johnson Controls Vivint, Inc. First Alarm Life Alert Emergency Response Alarmco Vivint, Inc.
5/1/2019 6/11/2019 7/23/2019 5/12/2019 7/11/2019 6/5/2019 7/10/2019 6/14/2019 5/31/2019 5/29/2019 6/15/2019 7/1/2019 5/12/2019 6/5/2019 6/30/2019 6/27/2019 6/13/2019 5/25/2019 6/1/2019 6/6/2019 5/28/2019 5/14/2019 6/27/2019 7/29/2019 5/11/2019 7/10/2019 7/13/2019 5/2/2019 7/12/2019 5/7/2019 6/26/2019 6/1/2019 5/27/2019 6/6/2019 6/13/2019 5/14/2019 7/21/2019 5/11/2019 5/22/2019 7/31/2019 6/3/2019 5/7/2019 7/12/2019 5/28/2019 6/7/2019 6/6/2019 5/17/2019 7/31/2019 5/6/2019 5/3/2019 7/5/2019 5/18/2019
Fall 2019
5/19/2019 5/24/2019 6/12/2019 7/26/2019 6/7/2019 5/25/2019 5/21/2019 5/5/2019 6/6/2019 7/30/2019 5/8/2019 5/27/2019 6/11/2019 5/17/2019 7/15/2019 6/24/2019 6/26/2019 5/21/2019 6/8/2019 6/16/2019 7/5/2019 5/27/2019 5/12/2019 6/5/2019
Brittany
Piatt
Wegmans Asset Protection
5/28/2019
First Name Last Name
Company
Graduated
Jacob Jared Anastasia John Vanessa Julienne Elizabeth Michael Kelsey Craig Pamela Tanner Breanna Lakia Steven Juanita Abigail Zachary Travis Matthew Jacqueline Alyese Cassie David Paige Lisa Bianca Holli Lyndrea Lyndsay Danielle Ayanna Donisha Olivia Taylor David Lucy Benjamin Rashee Matthew Erika Demosha Bradley Jane Brandon Joshua Jessica David Kathyrn Adrian Mahamat Chirese Elijah Mary Takeera Darrell Mya Kiara Richard Lacey Andrew Jenell Matthew Nekairah Emelyn Latonya Kayla Carletta Nathan Chiamaka Madison Jordan Joseph Salvador Lisa Priscilla York Rebekah Nicole Zachary Isabella Loren
Central Security Group Nationwide, Inc. Vivint Inc. Quick Response Monitoring Vector EAST United Central Control United Central Control Kings III of America American Burglary & Fire, Inc. Quinte Kawartha Alarm Systems (CA) Security Instrument Corporation Vivint, Inc. Vivint, Inc. THRIVE Intelligence Vivint, Inc. ADT United Central Control Vivint, Inc. Operational Intelligence Center G4S Secure Integration LLC Vivint, Inc. Vivint, Inc. Central Security & Communications Life Safety Monitoring, LLC Life Alert Emergency Response Acadian Monitoring Services Siemens Industry, Inc. Ackerman Security Systems Interface Security Systems Vivint, Inc. Stanley Convergent Security Solutions, Inc. Siemens Industry, Inc. Vector WEST THRIVE Intelligence Interface Security FE Moran Vivint, Inc. TelscoSecurity Systems (CA) Shreveport Security Systems VRI Operational Intelligence Center Interface Security Interface Security Vivint, Inc. Habitec Security ADT Canada Inc. (CA) THRIVE Intelligence Vivint Inc. Avantguard Monitoring Centers American Alarm & Communications, Inc. Interface Security Systems TakaneADT Canada Inc. (CA) THRIVE Intelligence Avantguard Monitoring Centers Vivint, Inc. THRIVE Intelligence Iverify.US, Inc. Ackerman Security Systems COPS Monitoring - Scottsdale Spectrum Security Per Mar Security Services Operational Intelligence Center Towne Monitoring Service National Monitoring Center THRIVE Intelligence Genesis Security Services, Inc Ackerman Security Systems United Central Control Central Security Group Nationwide, Inc. Seacoast Security TelscoSecurity Systems (CA) Operational Intelligence Center Stanley Convergent Security Solutions, Inc. Scarsdale Security Systems, Inc. Kings III of America Habitec Security Vector WEST Tech Systems Inc Vector WEST Acadian Monitoring Services THRIVE Intelligence Vivint, Inc. Kings III of America
5/20/2019 7/31/2019 7/10/2019 5/28/2019 7/9/2019 7/16/2019 6/17/2019 5/25/2019 7/17/2019 7/18/2019 5/2/2019 7/18/2019 6/25/2019 5/3/2019 5/3/2019 5/27/2019 7/18/2019 7/12/2019 6/19/2019 7/18/2019 5/22/2019 6/5/2019 7/17/2019 5/1/2019 5/23/2019 6/19/2019 6/1/2019 6/13/2019 6/9/2019 6/11/2019 6/6/2019 6/25/2019 5/14/2019 5/7/2019 5/15/2019 6/4/2019 7/2/2019 5/14/2019 6/14/2019 7/17/2019 5/27/2019 5/7/2019 5/7/2019 5/16/2019 5/9/2019 7/15/2019 6/4/2019 5/1/2019 5/7/2019 6/14/2019 5/15/2019 6/26/2019 6/7/2019 6/7/2019 6/24/2019 7/10/2019 5/27/2019 6/23/2019 5/17/2019 6/10/2019 6/27/2019 5/1/2019 6/6/2019 6/26/2019 5/3/2019 5/1/2019 7/1/2019 5/10/2019 5/15/2019 7/2/2019 6/24/2019 7/18/2019 5/16/2019 7/17/2019 6/17/2019 7/23/2019 7/10/2019 6/25/2019 6/5/2019 5/14/2019 6/4/2019 6/19/2019
Pinley Pitcher Porvasnik Quigley Ramirez Ramzas Rangel Reeser Reid Reynolds Roberts Roberts Robinson Robinson Roderick Rodriguez Rogers Rogers Root Rowe Ruiz Mateo Rush Rutter Sanchez Sanders Santiago Scaifie Schaffer Schauer Schmidt Scott Sellers Shackelford Sheehan Shobe Siegle Sikitoka Simmons Simpson Slagle Sosa Speller Spencer Starkey St-Germain Pulgarin Stice Stolle Storey Sullivan Sutton Bechir Tanner Taylor Taylor Taylor Thomas Thomas Thompson Thompson Thornburg Throup Tiefenthaler Tietz Toliver Torres Towns Trevino Trimble True Udegbunam Upchurch Urke Vairo Valdez Vallance Vega Veliz Veon Viator Wardrip Watson Watson
www.tma.us ď Ź TMA Dispatch | 33
LEVEL 1
Level 1 Graduates, cont. from page 31
LEVEL 1
Diane
Webb
Alert 360
5/23/2019
First Name Last Name
Company
Graduated
Justin Stephanie Tasha Brittney Rian Jamielle Valshanay James Devennai Jasmine Collin Kristin Robert Ryan Cory Nailah Jenny Avery Bianca Mohammad Amber Jennifer Taylor Victoria Randi
Brinks Home Security Interface Security Vivint, Inc. Securitas Electronic Security Iverify.US, Inc. THRIVE Intelligence Ackerman Security Systems Central Security Group Nationwide, Inc. THRIVE Intelligence Vivint, Inc. Hunter Security Inc Vivint, Inc. Redwire Houle Electric (CA) Johnson Controls Ackerman Security Systems Habitec Security Spectrum Security Brink’s Canada Limited (CA) Paladin Technologies (CA) VRI Washington Alarm THRIVE Intelligence Central Security Group Nationwide, Inc. Vector WEST
7/30/2019 5/29/2019 6/6/2019 5/28/2019 6/28/2019 5/14/2019 5/26/2019 5/14/2019 5/14/2019 7/31/2019 7/30/2019 5/9/2019 5/23/2019 7/4/2019 7/30/2019 5/26/2019 5/9/2019 5/17/2019 5/16/2019 6/12/2019 5/17/2019 5/20/2019 5/14/2019 5/23/2019 5/20/2019
Wharton White White Whitlock Williams Williamson Williamson Willis Wilson Wilson Withee Wood Woodard Woytowich Wozny Wright Wyse Yarn Yates Younesi Young Yulee Zackery Zamora Zarilla
French Canadian Spanish
TMA is pleased to present the following Virtual Product Review...
Network Navigator: Cybersecurity, Network Health, and More Learn the benefits of the Network Navigator, part of Bold’s Security Intelligence suite of cybersecurity products developed specifically for our industry.
Speaker: William Brousseau Director of Technology Bold Group – stages®
Thursday, October 24, 2019 | 2:00 PM [EST] Register now to attend on the TMA website.
Monitoring Center Operator Level 2 Training Graduates
USA and international graduates completed May 1, 2019 to July 31, 2019
First Name Last Name
Company
Graduated
First Name Last Name
Company
Graduated
Janna Kelby Jonathan Kayleigh Willmary Melissa Zach Brian Jan Christy Kyle Nathaly Angeline Marlie Garrett Tony Darrell Andrew Damon Ian Jake Guidna Thai Sophia David Lauren Johara Kassidy Shamain Noah Mia Donald Vicky Casey Stephanie Caitlyn Brian Natalie Katrina Greg Joshua Sydney Andralina Renee Brittany
Statewide Central Station Security Equipment Inc United Monitoring Operational Intelligence Center Genesis Security Services, Inc (PR) Operational Intelligence Center G4S Secure Integration LLC Allied Universal Security Northern911 (CA) COPS Monitoring - New Jersey COPS Monitoring - New Jersey COPS Monitoring - Boca Raton Time Warner Security Security Alarm Corporation Operational Intelligence Center Operational Intelligence Center Security Equipment Inc COPS Monitoring - New Jersey Wegmans Asset Protection COPS Monitoring - New Jersey COPS Monitoring - New Jersey COPS Monitoring - Boca Raton Per Mar Security Services COPS Monitoring - Texas Operational Intelligence Center COPS Monitoring - New Jersey Genesis Security Services, Inc (PR) COPS Monitoring - Texas COPS Monitoring - Scottsdale COPS Monitoring - New Jersey COPS Monitoring - Scottsdale COPS Monitoring - Boca Raton ADS Security L.P. Quinte Kawartha Alarm Systems (CA) Valley Security & Alarm COPS Monitoring - New Jersey American Alarm & Communications, Inc. Operational Intelligence Center TelscoSecurity Systems (CA) G4S Secure Integration LLC Wegmans Asset Protection Engineered Protection Systems, Inc. COPS Monitoring - New Jersey COPS Monitoring - New Jersey COPS Monitoring - New Jersey
6/6/2019 6/19/2019 5/9/2019 6/26/2019 5/3/2019 6/29/2019 6/19/2019 5/3/2019 6/13/2019 6/2/2019 7/29/2019 7/7/2019 5/17/2019 6/25/2019 6/19/2019 6/27/2019 6/25/2019 7/17/2019 5/10/2019 7/31/2019 7/28/2019 7/16/2019 5/11/2019 6/26/2019 6/29/2019 7/14/2019 5/21/2019 6/26/2019 6/17/2019 7/27/2019 6/23/2019 7/2/2019 7/24/2019 7/11/2019 5/31/2019 6/20/2019 5/6/2019 6/29/2019 7/8/2019 6/27/2019 7/9/2019 7/1/2019 7/16/2019 6/10/2019 6/16/2019
Paddy Alice Shaundra Drew Kirstina Duline Jessica Kelley Carolyn Ian Lisa Joshua Jerry Samuel Lisa Doug Dianna Gabrielle Jonathan Daniel Brittani Alexandra Christine Crystal Nathan Zachary Amy Travis John Nicole Lucy Benjamin Michele Nguyen
Kearney Kenney Kimbrew Knudson Lee Louis-Fils Marsh McCulla McDonald McKee Meekins Mellen Michel Noel Nugent Pacheco Panarello Papapietro Peacock Perez Pittman Plotsker Pontano Purcell Robertson Rogers Romaine Root Rose Rutter Sikitoka Simmons Stevenson Tan Hung
5/13/2019 7/30/2019 5/10/2019 6/6/2019 7/7/2019 7/9/2019 6/16/2019 6/6/2019 7/25/2019 6/2/2019 5/10/2019 6/15/2019 7/2/2019 5/17/2019 5/13/2019 5/5/2019 5/7/2019 6/3/2019 7/23/2019 7/11/2019 6/26/2019 7/11/2019 5/11/2019 6/4/2019 6/18/2019 7/12/2019 5/19/2019 6/23/2019 5/7/2019 6/20/2019 7/4/2019 5/14/2019 6/24/2019
Andre Andrew Emelyn Chiamaka Madison Brandi Melinda Sherry Nichole Kadarius Ryan
Thompson Throup Torres Udegbunam Upchurch Veneziale Venters Villa Walizer Washington Woytowich
Paladin Technologies Inc (CA) COPS Monitoring - New Jersey COPS Monitoring - Scottsdale Security Equipment Inc COPS Monitoring - Boca Raton COPS Monitoring - Boca Raton COPS Monitoring - New Jersey Safe Systems G4S Secure Integration LLC COPS Monitoring - New Jersey COPS Monitoring - Maryland Operational Intelligence Center COPS Monitoring - Boca Raton COPS Monitoring - Boca Raton COPS Monitoring - Scottsdale American Alarm & Communications, Inc. COPS Monitoring - New Jersey Statewide Central Station COPS Monitoring - Scottsdale COPS Monitoring - Boca Raton COPS Monitoring - Texas COPS Monitoring - Boca Raton COPS Monitoring - New Jersey COPS Monitoring - New Jersey COPS Monitoring - Scottsdale Operational Intelligence Center TSI G4S Secure Integration LLC Per Mar Security Services COPS Monitoring - New Jersey TelscoSecurity Systems (CA) Shreveport Security Systems COPS Monitoring - New Jersey CMS 911 Security Services Joint Stocks Company (VN) COPS Monitoring - Boca Raton Operational Intelligence Center Genesis Security Services, Inc (PR) TelscoSecurity Systems (CA) Operational Intelligence Center COPS Monitoring - New Jersey COPS Monitoring - Maryland COPS Monitoring - New Jersey COPS Monitoring - New Jersey COPS Monitoring - Texas Houle Electric (CA)
Allen Bachman Bates Bilbrey Boria Rosa Bowers Brammer Brown Buckland Byrd Byrd Chavez Clayton Cochran Coffey Crenshaw Crews DeJesus Demyda Doyle Drinkwater Dumerlus Durborrow Espinosa Evans Farrar Fuentes Vázquez Fuller Garner Gilchrist Gonzalez Green Green Guest Gutierrez Helmbold Hoffman Hoover Horchover Smith Hosena Hunt Johnston Joynes Jurich Kavalchick
34 | TMA Dispatch www.tma.us
6/12/2019 7/7/2019 6/27/2019 5/9/2019 7/5/2019 6/30/2019 7/25/2019 5/10/2019 5/22/2019 7/6/2019 7/12/2019 7/16/2019
Fall 2019
Migrating Legacy Data The Dreaded Data Conversion By Victoria Ferro, President, Micro Key
Many monitoring stations have outdated, complex, on-premise monitoring systems. There are plenty of new options, including cloud alternatives, which come with many benefits, but a lot of companies limit themselves to their existing platforms, perpetuating cumbersome workflow and lack of automation due to the fear of the dreaded data conversion. Let’s be honest. Migrating legacy data is hard. Legacy systems were developed with older workflow concepts and workarounds to accommodate the lack of automation. Therefore, making these older workflows and workarounds fit into more sophisticated systems can be difficult. You don’t want to lose the processing workflow that your customers are accustomed to, but you want to simplify the workload on your monitoring staff by taking full advantage of the new automation options available. Adding to the conversion complexity, no one wants to start from scratch and enter data into a new system by hand. That would be too cumbersome! We need to migrate this data! Around 50% of deployment effort is centric to migration activities. Data Migration and Data Conversion is a major topic for Micro Key Solutions. Based on my seventeen years of experience coaching companies through migrating their monitoring and accounting solutions, I have developed a road map to set companies up for success with any data migration project. Make the Data Migration its Own Project within the Larger Project of Switching Software Platforms. Data migration is a complex activity, deserving a separate project plan and team. You read correctly, data migration requires its own team! That is not to say that those team members are exclusive to only the data migration. This team most frequently participates in numerous tasks involved in the overall project, but it is imperative to identify a team lead for the data migration whose primary responsibility is the data migration. Accountability, a plan, and migration scope must be created at the project’s beginning, ensuring no surprises, such as “Oh, we forgot to load those clients or review those reports” two weeks before the go-live.
Engage the Right Internal Team Business / Accounting people are the only ones who truly understand the accounting data reports and can decide what data can be thrown away, what data to keep or what dates or numbers to start with. Client services or dealer services teams are most likely people who understand the monitoring nuances or configuration for specific accounts or requirements for Dealer’s and Dealer’s customers. It is important to have somebody from the business team and monitoring team involved during the mapping and decision making for the accounting side and monitoring side. Even if data migration mapping is reviewed and approved by the teams, surprises can appear once the data shows up in the new system’s User Interface. Since a picture is worth more than a thousand words, load a test batch into the new system, and let the business team play with it. Load a batch of subscriber information for the monitoring team and have them pull up manual signals from the specific accounts as well as signal types to see how the processing would flow. Both teams should take copious notes and relay those notes to your new software vendors’ data migration team. This is the process that builds the first, second, and even third data conversions. Failing to engage subject-matter experts, who are usually very busy people, is the most common cause of problems after a new system goes live. Recommended Project Plan Basics for the Data Conversion Team The Internal Data Migration team should meet on a mutually agreed-upon frequency with the new software vendor’s migration team. Each meeting should include a review of the last data conversion efforts, feedback for the next round, a summary of next data delivery, the next data drop date and confirmation of the next scheduled meeting. The Internal Data Migration team should have blocked time on their work schedules for data review centric to each estimated data delivery date. This is vital to the project. If for some reason the team misses the data check at any given point, they should immediately notify the internal Project Manager or Stake Holder for the whole project. The combined teams should determine if the delays will impact the Go Live date or if they can make the time up in another area or work overtime. If not, scheduling adjustments should be made. Migrating Legacy Data cont. on page 36
Fall 2019
www.tma.us TMA Dispatch | 35
Migrating Legacy Data cont. from page 35
Yes, a failure to review data in a timely manner from your team can and will push back a Go Live scheduled date. Data Reviews during this period should be given the highest priority. Know the Basics of Data Conversion & Your New Software’s Business Terminology Data mapping is the process of creating data element mappings between two distinct data models or in our case two different software solutions. I always recommend that the Internal Data Conversion Team go through a demo or an overview of the new software system (that they are migrating) to visualize where the old data will now live or how the old data will be used to create new functionality or automation. The new software provider’s implementation documentation should include a section on data conversion with a data dictionary of definitions, field types, character length, etc. for reference. The Internal team should also have basic training, understanding, and a list of instructions and reports they should run on the new system when they get the preliminary data to review. Decide the best data migration approach for your company with your software partner. Will you load the data all at once, or load small batches every week? This is not an easy decision. The approach must be agreed upon and communicated to your internal data migration team, project stakeholders and your new partner’s data migration team. Everybody needs to be aware of when and what data will appear in the new system. The internal migration team’s work begins with each new data upload. The data must be checked, verified and feedback communicated back to the new software’s data migration team. Is your team prepared to review a weekly data upload or an even better question is do they have time to perform the data reviews and the scope of their everyday
36 | TMA Dispatch www.tma.us
job responsibilities? Or, would it be easier to review one major data upload with a team of people to validate the integrity at one dedicated block of time? For more basic data migration, some companies offer an “export and import” item handled by a “push one button” data migration tool that has a predefined mapping for target systems. This can be a GREAT data migration or data entry tool for getting started to provide the shell of the account to work from without having to start from the beginning. This scenario is also a great option for accounting migrations and for companies wanting to semi “start-over” to clean up years and years of legacy data. “Push one button” data migration in conjunction with a bridging software solution from your old to new automation software for monitoring stations is another great option. Using technology, your incoming signal traffic will pass through your old automation software for processing by the operators but log to your new software for data accumulation and review. Invalid signal reports can be run daily, and the data associated with those signals can be addressed. Many stations chose this method for a period of time. When comfortable, they switch the bridge to the new software receiving the signal first for processing and review and then passing to the old software for processing and failover in an emergency. This final part of the bridge is then dropped at your comfort level. At this time, duplicate data entry will need to be done into both software platforms. Estimate Realistically Do not underestimate the complexity of the data migration. Many time-consuming tasks accompany this process, which may not be apparent at the project’s beginning. Some of these tasks from a Monitoring perspective include, basic subscriber /customer information verification, call lists and call order, special handling or special instructions. From an accounting perspective, subscriber basics, and
most importantly, recurring billing charges must be verified, beginning balances, servicecentric information. There is a high probability that the accounting information and monitoring information live in different software systems. If you are moving to a single point of entry system like Micro Key, you need to find a common link to the monitoring information and the accounting information so that it can be merged into one account. The most common unique identifier is Central Station ID or panel number. The migration plan must include ample time for preliminary data review, then secondary data review. Will you run tandem with a bridge for monitoring stations for a period or will there be a straight cutoff date from the legacy system? For an accounting system migration, will you run billing cycles in tandem and keep up data entry of new items on both legacy and new systems once the final conversion has been delivered? Some other data-centric items to take into consideration are loading specific data sets for training purposes with realistic data, but with sensitive items deleted, so that training activities do not generate email notifications to clients or alarms in the case of monitoring migration. Check Data Quality Do not overestimate the quality of source data, even if no data quality issues are reported from the legacy systems. New systems have new mandatory fields or different formatting rules for certain data, which may not have been applicable in the legacy system. Here’s a simple example. Contact email can be mandatory in the new system, but a 20-year-old legacy system may have a different perspective. Data quality significantly impacts effort and the simple rule is: The further we go in history, the bigger mess we will discover. Thus, it is important to decide early on how much history, if any history, we want to transfer or can transfer into the new system. Get Ready for Go Live Migrating Legacy Data cont. from page 37
Fall 2019
Migrating Legacy Data cont. from page 37
Coming Soon: New Operator Online Level 2 The course content continues the operator journey started in Level 1...
The data has been checked, double-checked and maybe triple checked. Be prepared for the unknown or the unexpected to surface. Don’t freak out. Take a breath and work with your software provider on how to address the issues. Your company will have come too far to take a step backward. Embrace the positives in which your new software has provided and work through the pain of change with your staff. Pain is short term and soon forgotten!
Fall 2019
It mirrors TMAÊs Operator Code of Excellence that features professional behavior and commitment to the professional monitoring industry where life-safety and protection of property and business processes are paramount. There are six modules presented in a narrated format. Look for more release details!
Train. Motivate. Advance.
www.tma.us TMA Dispatch | 37
Consumers Show Interest in Independent Living Solutions and Telehealth Services The home is now a focal point for consumer-centric healthcare solutions. The expansion of connected medical devices and telehealth services into the home, as well as the increasing movement of connected consumer devices into health and wellness, is growing new markets for independent living solutions that serve the elderly, patients with chronic conditions, rural households, and caregivers. More than 85% of consumers ages 65-74 report having Wi-Fi access in their home, which is higher than the national average. This provides a strong foundation on which to build connected health offerings; however, solutions need to be tailored to the individual preferences of each person, which is a key strength in smart home solutions. Parks Associates’ Q2 2019 study of 5,000 US broadband households finds that 49% of US broadband households consider the ability of a connected health device to interact with a security system or smart door lock to perform an “all is well” check at night appealing. This routine would be triggered when the user goes to bed to ensure the house is secure with all doors locked and the security system armed. Monitoring and voice controls are also noted as musthave features for independent living solutions: 27% of seniors 65 years and older report safety monitoring is a must-have feature for an independent living system 13% of seniors 65+ and 30% of caregivers consider voice control a must-have feature for an independent living system Telehealth services continue to grow in awareness with all population segments, offering a new experience for consumers and providing access in new ways to healthcare. While the majority has never used telehealth services, more than one third of US heads of broadband households ages 65 and older are interested in telehealth
services. Of seniors who have never used telehealth services, 44% believe an in-person appointment would provide better diagnosis and treatment. So to be successful, these solutions need to focus on that personal connection to ensure patients are comfortable with these innovations. The independent living market is challenging in many ways, but particularly because the end-user may not be the buyer of the product. Caregivers consistently show higher interest and higher willingness to pay for a solution than do seniors themselves – particularly seniors ages 75 plus who are most in need of such a system. Affordability is another issue for seniors, many of whom are on fixed incomes in retirement: 38% report being “very concerned” about having sufficient financial resources as they age. The majority of interested caregivers would pay $50 per month – the highest price point tested – for an independent living solution for their loved ones. 77% would pay $30 per month – the same monthly price as Best Buy’s Assured Living solution (plus upfront equipment fees). Companies with existing footprints in the home, like service providers, and those with experience monitoring home activities, such as professional security monitoring and PERS monitoring companies, will continue to explore the potential role in consumer wellness. For more information about Parks Associates consumer or industry research on the health or smart home market, visit www.parksasociates.com
Parks Associates is an internationally recognized market research and consulting company specializing in emerging consumer technology products
38 | TMA Dispatch www.tma.us
Fall 2019
39 | TMA Dispatch www.tma.us
Fall 2019
Deliver Dependable Fast Cell Alarm Reporting OR
Don’t leave fire alarm accounts hanging
Choice of LTE Networks: Coast-to-Coast Coverage
Tradeup any FACP from POTs to Cellular Under $50* & 15 mins. + Create New Fire RMR • Safeguard All Fire Alarm Accounts now in jeopardy of failing to communicate as weather, events or Telephone Companies continue to cut off leased landlines without notice Tradeup to StarLink Cell Communicators under 15-mins. & $50 with exclusive Free for All™ Program* • Improve alarm response times when seconds matter most, with StarLink Fire® cellular LTE reporting to any Monitoring Station you choose
or
• Generate new Fire RMR providing cell reporting, while saving accounts $1000’s of budget dollars per year vs. POTs - Each Starlink Fire Cell Communicator replaces 2 leased landlines per FACP • Supports Any FACP brand, 12V or 24V, new or old - StarLink Panel-Powered Technology installs in minutes; Low current draw, NO additional power supply & NO extra conduit • Choose AT&T or Verizon LTE StarLink models, proven to work, even where others won’t, using Signal Boost™ & twin dual diversity antennae for max. signal acquisition & null avoidance • StarLink Incentive Program Saves $100, every account & every time Tradeup POTs, any manufacturers’ sunset/old radios, or new installations
Save $100 new & old installs*
• Dual Path Cell/IP Models Save Even More Time & Money - with 4 programmable EOLR zone inputs; 2 Form C Relay outputs (eliminating extra supervision modules); plus, 2 Telco jacks for EZ FACP-connection • Preactivated to ensure communication, saving onsite labor & save time • Meets Latest Fire Codes: NFPA 72 2019, UL 864 10th Ed, CSFM, LAFD, NYC FD, etc. See us at ISC East NYC, Booth 203
LTE
1.800.645.9445 • www.StarLinkLTE.com
StarLink, StarLink Fire™, Free for All™, Signal Boost™ are trademarks of Napco. Other marks trademarks of their respective cos. †For model compliance listings always consult tech docs & AHJ. Sugg. pricing quoted in USD with Free for All™ Tradeup Incentive Program - see full details www.napcosecurity.com/starlink/starlink4gupgrade.
Falll 2 Fal 2019 019
TMA FP8 5Wx11HStarCrossed091719V2 indd 1
www.tma.us ww .tm www tmaa .u s TMA TM Dispatch Dispa Di spatch ch | 40 0
9/20/19 4:57 PM